Sharing contact details is all about improving user experience, says Facebook
News Security
Sixth Formers Win Cyber Security Challenge Prize
The team stage of the contest has found winners including a group of sixth-formers
Does Virtualisation Break Compliance?
Companies face increasingly stiff regulations for their IT. Peter Judge asks - if you virtualise your servers, will you fall foul of compliance rules?
Coordinated Cyber-Attack Could Create ‘Perfect Storm’
A war fought entirely in cyberspace is unlikely but governments must boost their defences, says the OECD
Critics Bash Facebook For Sharing Phone Numbers
Rogue apps will be able to harvest contact details shared by Facebook, warn experts
Attackers Target Pentagon Credit Union
A hacked laptop has been used to breach the defences of a bank used by the US military
Expert To Reveal Data Theft Secrets
A security expert will use the upcoming Black Hat conference to reveal methods of sneaking data out of enterprises
RIM To Offer Cloud-Based BlackBerry Enterprise Server
Small businesses will be able to use an encrypted email system when RIM launches a cloud version of BES
Researcher Uses Amazon To Hack Wi-Fi Network
A security reseacher has revealed how he used Amazon's cloud service to hack into his neighbour's Wi-Fi network
President Sarkozy Wants Net Censorship On G8 Agenda
The French president, an opponent of an unregulated Internet, wants to make censorship a global initiative
IT Spending Will Double To More Than £6bn by 2016
Hardware replacement, mobile devices, cyber-threats and cloud spending will exceed $10 billion in five years
NetSuite Adds CyberSource To Flag E-Commerce Fraud
Screening software in NetSuite's cloud-based ERP platform makes it easier to screen fraudulent transactions
SAP Acquires Security As Black Hats Take Aim
As SAP buys into ID management, an event at Black Hat DC will put Web-enabled SAP apps in the line of fire
Euro Child-Porn Gang Hijacks Legitimate Servers
An Eastern European child pornography ring doctored server links to point to their illegal wares
Blue Coat Targets SMB Protection With ProxyOne
Blue Coat is touting the ability of its ProxyOne appliance to protect SMBs from growing online threats
How Do You Forge A Digital Identity?
IT is now charged with the job of extending existing IDs or incorporating new ones to accommodate a digital presence, says PJ Connolly
Microsoft Patches Flaws But Still Works On IE Fix
In its first Patch Tuesday of the year, Microsoft has fixed three Windows bugs, one of which was rated critical
Billions Of Visits To Sophisticated Piracy Websites
A report from MarkMonitor found 43 well-managed digital piracy sites gained over 53 billion visits per year
Government To Cut Costs With Cloud Computing
The government will look to outsourcing and cloud computing to cut costs in 2011, predicts Ovum
Spam Returns With a Vengence After Christmas Lull
The number of spam messages is now back to its normal painful levels after the Christmas break
Vasco Strengthens Authentication With DigiNotar Buy
Vasco has acquired a Dutch authentication specialist to enter that country's e-government market
Irish Opposition Party Website Hacked By Anonymous
The Anonymous group has hacked Fine Gael's website, and stolen thousands of confidential details
Judge Sets Assange Extradition Hearing
WikiLeaks founder Julian Assange will face an extradition hearing on 7 and 8 February, a judge has pronounced
Weaponised Malware Poses New Security Threat
The recent Stuxnet attack on an Iranian nuclear facility sounded like just another attack, but there was more to it, says Jeff Hudson
Researcher Bypasses Flash Sandbox Security
A security researcher has identified a way to bypass the security measure that protects Adobe's Flash Player
RIM Ordered To Block Porn Sites In Indonesia
BlackBerry maker RIM must censor online porn by 21 January to avoid being shut down in Indonesia
Google Apps Gets Anti-Spam Tool
Google has added DKIM signing to Google Apps, giving users a way of steering clear of spam filters
Iceland Hits Back At WikiLeaks Investigation
The US ambassador has been called to explain why an Icelandic MP is under investigation over WikiLeaks
US Government Calls For Identity Ecosystem
The Obama administration has outlined plans for a private sector-led identity system intended to reduce fraud
Spam Declines As Botnets Rethink Their Strategies
Spam levels fell over Christmas but Symantec reckons this may be the lull before a storm coming in 2011