Workers who discuss sensitive data in public places are at risk of causing serious data breaches, warns Wendy Goucher
News Security
‘Generation Gmail’ Threatens Corporate Data Security
People under the age of 25 send work-related emails from their personal accounts and leak company information
Libya Internet Curfew Could Affect .ly Domains, Possibly
As strife-torn Libya interrupts Internet access, bit.ly users worry about the fate of their URL shortening service
Google Joins ISP-Level Anti-Phishing Scheme
Return Path is getting big backers for its Domain Assurance service designed to combat phishing scams
Kaspersky Security Suite Adds Android And BlackBerry
Kaspersky Lab adds privacy, malware and theft protection for Android and BlackBerry in Mobile Security 9
Bank SMS Passcodes Intercepted By Zeus Variant
The Mitmo Zeus Trojan has infected phones to intercept login SMS credentials and access bank accounts
AVG Continues SMB Focus With Online Security Audit
AVG is offering SMBs a free security audit to help in the ongoing fight against cyber crime
Government Cyber Crime Report Debunked
An IT security professor claims the government's cyber crime report is merely sales bumf for BAE
Controversial US Church In ‘Anonymous’ Row
An anti-gay US church has faked a letter threatening a DDoS attack, purporting to be Anonymous hacktivists
Report: The World Needs To Wake Up To SAAS
Despite software-as-a-service's potential to be the next wave of IT, it is still a client-server world
Nice Try Google, But Your Security Is Still A Chocolate Fireguard
Google’s move to add two-step authentication is laudable, but could lull users into a false sense of security, says Eric Doyle
India Pressures Operators For BlackBerry Intercepts
Local mobile operators are being pressured by the Indian government for access to BlackBerry emails
Libya Cuts Off Internet Service
Arbor Networks has reported that Libya's Internet connection has gone offline, with Bahrain also throttled
UC Expo
As a show, Unified Communications Expo mirrors the diversity of Unified Communications by bringing together all the key technologies and key people of this rapidly evolving world. Get the answers to all your toughest questions, and pra ...
SSD Data Purging Presents Security Difficulties
Californian researchers have found that fully erasing SSDs is more difficult than previously thought
Microsoft Investigates Windows Zero-Day Vulnerability
Microsoft has confirmed it is investigating a possible zero-day vulnerability that affects Windows
Social Media Access May Cause Governance Problems
Gartner claims half of all companies, fearing prosecution, may attempt to block social networking site access
Terrorist Tracking Could Open Europe To US Spying
The US can access EU financial data under an agreement designed to track terrorist funds
Thieves’ Evolving Tactics Challenges Cyber-Detectives
Security experts survey security changes and how international collaboration is helping in the fight
Intel Boosts Management And Security For vPro 2.0
Intel is promising better and simpler security and management with its next version of vPro
Cyber Crime Costs UK £27 Billion A Year
The shocking cost of cyber crime to the UK economy has been revealed in a new government and industry study
RSA: Cyber War Mass Hysteria Is Hindering Security
Cyber-war stories from the defence industry may be a distraction, pundits told the RSA conference
Inside The Botnet Threat Highlight At RSA
Dell and Damballa discussed the growth of toolkits and pay-per-install botnet growth at the RSA Conference
Government Promises £63 Million To Fight Cyber Crime
Home secretary Theresa May has revealed planned spending on fighting Internet threats, before a report in Spring
London Stock Exchange Moves To Linux Platform
Falling behind and under potential cyber-attack, LSE has made a move to Novell's open source SuSE Linux
Virtualisation Is Real Security Focus At RSA Conference
For Trend Micro, Symantec and Hewlett-Packard, virtualisation is a focal point at the RSA Conference
First Network Security Appliance Unveiled By IBM
The IBM GX7800 is an appliance for Web-application protection stretching to private and public clouds
Nintendo Hacker Arrested In Spain
The Spanish police have arrested a man accused of hacking and leaking Nintendo users' data online
Imation Boosts Capacity On Removable Storage Devices
Imation has increased the capacity of its Defender line of flash storage devices and upgraded its security software
Is Key Management The New Compliance?
Compliance standards now know that encryption is no good unless the keys are managed, says Jon Geater. Better start doing that!