Documents are increasingly being exchanged through the Cloud, encryption is one way to prevent their misuse
News Security
Choose Your Own Device Promises A More Secure Future
Bring-your-own-device means all manner of hardware is starting to appear on the network. Eric Doyle argues that there is safer path
RSA 2012: WAF Added To QualysGuard Cloud Security Platform
Web Application Firewall touted to protect against spammers, SQL injections and DDoS attacks
RSA 2012: Zero-Day WebKit Flaw Allows Android Device Takeover
Start-up CrowdStrike will demonstrate the use of a flaw in Android WebKit to take full control of mobile devices
WikiLeaks Publishes Emails From ‘Shadow CIA’ Firm Stratfor
WikiLeaks has begun publishing millions of emails thought to have been obtained from intelligence firm Stratfor in a December hack by Anonymous
RSA 2012: SHadoop Adds Security To Big Data
Zettaset's SHadoop is intended to make it easier for organisations to control user access to data within Hadoop clusters
Google Agrees Not To Track Users, If They Ask Nicely
More than 400 companies agree to help implement the browser “do-not-track” button
Smartphone Social Media Users Are Prone To Identity Theft
Smartphone owners and social media users are more likely to become victims of identity theft, claims Javelin Strategy
HTML5 Copyright Protection Proposals Branded “Unethical”
Google, Microsoft and Netflix lend their support to DRM for HTML5
Obama Releases Bill Of Rights Proposal For Online Privacy
A US privacy bill proposed by President Obama will give Web surfers access to their data and an online tracking opt-out
German Authorities Close Skyload.net In Piracy Probe
Another file-hosting site linked to copyright infringement goes dark in Megaupload's aftermath
Juniper To Halt Web App Attacks With Mykonos Buy
Attacks against web applications are a growing threat that Juniper hopes to challenge with its Mykonos purchase
SMBs Face Growing Security Threat From BYOD
Mobile devices are posing a growing security threat to SMBs, who often do not have adequate tools and software
YouPorn Users’ Emails And Passwords Laid Bare Online
Hackers publish personal details online - exposing security flaw that has existed for five years
Open Source Code Is As Good As Proprietary, Says Coverity
Open source code scanned by Coverity had slightly fewer flaws per 1000 lines
Illegal GPS Jammers Are Widespread, Study Finds
Research by the Government-backed Sentinel consortium shows dangerous GPS jammer use in the UK is on the rise
MWC 2012: Symantec Survey Confirms Mobility Trend
BYOD is problematic, and social media is frowned upon in today's businesses, symantec told TechWeekEurope
IBM QRadar Security Analytics Platform Uses X-Force Threat Database
IBM's security intelligence platform arose from the Q1 Labs acquisition and accesses 400 malware databases
Google Hit With Lawsuits Over Safari Tracking
Google is being sued in the United States over its placement of online ad cookies in the Safari browser
Standalone Akamai Security Service Aims To Block DDoS Attacks
Akamai has announced Kona Site Defender security service to defend customers against various types of DDoS attacks
Open Threat Exchange Aims To Improve Your Security For Free
Richard Kirk of AlienVault introduces Open Threat Exchange, a free, open-source enterprise IT security tool
Megaupload Founder Kim Dotcom Granted Bail By New Zealand Court
Dotcom to be placed under house arrest as fight against US extradition continues
Symantec PCAnywhere’s Limited Vulnerablity Called Into Question
An attack script has been posted online that can crash pcAnywhere as security researchers warn that old code can show current loopholes
Google Says Microsoft’s IE9 Privacy Policy Is Broken
Google doesn't follow P3P, but then nor does anyone else, says Google's communications vice president
Microsoft Says Google Bypassed IE9 Privacy Settings Too
Microsoft says that Safari was not the only browser that Google tricked into accepting cookies
Consumerisation of IT Summit
The Consumerisation of IT has become the hottest of industry topics but with all the talk, blogs, surveys and tweets, how do you make sense of it and understand the change it represents?
Ovum Events Hybrid IaaS: Coming of Age |Compute | Store | Network
Ovum Events are proud to introduce Hybrid IaaS: Coming of Age on 27 March 2012 at the Grand Connaught Rooms in Central London. This Ovum event is designed to inform senior IT professionals about the opportunities and challenges face ...
Congressmen Ask FTC To Investigate Google Over Safari Tracking
Google says it is working to remove cookies “inadvertently” set on Safari users’ systems
McAfee And Xerox Team Up Over Printer Security
McAfee is to extend its security software to Xerox printers, as the two companies partner up over security
Iran Blocks More Websites Ahead Of Elections
The Iranian government expands its programme of web censorship ahead of March elections