Security

Trend Aims To Simplify Endpoint Security

New Endpoint Platform and Client-Server suite should take out some of the legwork, company promises

16 years ago

Amazon Rejects Hacker Glitch Claims

An Amazon.com glitch reduced the sales rankings of 57,000 titles - but something isn't right about the story of the…

16 years ago

Adobe Is Web Hackers’ Top Target

Adobe's Flash player and Acrobat software were the top targets for hackers attempting to install malware on Europe's PCs during…

16 years ago

IT Security Must Enable Business, Not Disable It

Security professionals should try to add value to business and make new business models possible, instead of focusing on restricting…

16 years ago

US Power Grid Hack “No Surprise”

Experts contend the simple ability to map the electrical infrastructure is not the same as knowing how the system is…

16 years ago

Microsoft Infringed Patents – In The Name Of Anti-Piracy!

A court has ruled that Microsoft's piracy-busting Product Activation system used technology patented by someone else. Meanwhile it was fined…

16 years ago

Conficker Worm May Have Finally Turned

The hackers behind the infamous Conficker worm are making their move, roughly a week after many people expected

16 years ago

Symantec’s New Boss: Stop Buying Storage

Storing and securing data more efficiently is the way IT managers are going to have to go during the recession

16 years ago

US Power Grid Hacked: Is The Smart Grid Safe?

Foreign spies placed malware on the US electricity grid. Where does this leave government security, and the Green Grid?

16 years ago

Microsoft’s XP Support Still Beats The Competition

From next week, Microsoft Windows XP and Office 2003 support and fixes will cost money. But that is much better…

16 years ago

Start-up Takes On Virtualisation Security

The HyTrust Appliance is designed to give IT administrators greater control over their virtual environments and ensure greater security and…

16 years ago

UK Reveals £650m ID Card Contracts

The government has awarded contracts to CSC and IBM to upgrade biometric passports and other systems that will pave the…

16 years ago

Sun Targets Growing Healthcare Sector

Creating a more efficient and secure way to exchange such medical information will lead to better patient treatment and improved…

16 years ago

Hackers Target PowerPoint Vulnerability

If successfully exploited, the PowerPoint bug could enable hackers to take control of the victim's computer

16 years ago

Security Expert To Demo SQL Injection At Black Hat

If successfully exploited, the attacks give the hacker complete control over the database server operating system, file system and the…

16 years ago

More Wi-Fi In Smartphones = A Security Risk

Wi-Fi has become an essential feature of smartphones, and more apps are using it. But they may not be secure,…

16 years ago

Conficker – No Big Outbreak, But Threat Remains

April 1 has come without major trouble from the worm, but users should remain vigilant, apply the existing defences -…

16 years ago

EC: Major Cyberattack Could Cost £179bn

There is a 10 to 20 percent risk of a major failure in communications networks within the next 10 years,…

16 years ago

Security Researchers Open New Front In Conficker War

Security vendors are taking advantage of a discovery by two members of the Honeynet Project who uncovered a new way…

16 years ago

Why Hackers And Regulations Cost The Earth

Security threats like Conficker, along with the regulations and measures to combat them, are a nightmarish waste of resources, says…

16 years ago

Conficker: How Scared Should We Be?

A major update is due for Conficker on Wednesday. But should we fear such a well-understood piece of malware?

16 years ago

Psyb0t – The First Linux Botnet

Psyb0t exposes router and broadband vunerabilities.

16 years ago

Google’s Enterprise Credibility Is On the Line

Security flaws reported in Google Docs have been described. If Google doesn't take these reports seriously, it will lose the…

16 years ago

Google Denies Severity Of Google Docs Flaw

Google says that security concerns about its online document service Google Docs are "not significant", despite claims that users can…

16 years ago

Microsoft SharePoint – Are You In Control?

30 percent of SharePoint servers are deployed outside the management of the IT department.

16 years ago

Malware Is Getting Stronger, But All You Need Is A Little Common Sense

There's plenty you can do to protect yourself against malware. The best precautions are tough policies, common sense and experience,…

16 years ago

How The Spam Jam Became Business As Usual

Why do we still have spam, when we have the tools to eliminate it? Because the spam problem is simply…

16 years ago

Web Browsers Need Better Security

IE 8, Firefox and Safari all need to keep boosting security, even though hackers are concentrating on Web applications

16 years ago

UK Online Fraud Up 132 Percent

A new police e-crime unit will help combat the threat, according to payments industry body

16 years ago

Intel Chip Flaw Could Be Used By Rootkits

Security researchers have released proof of concept exploit code for an Intel chip flaw that could be abused to compromise…

16 years ago