In a sign of Twitter's increasing commercial focus, the micro-blogging site has announced it is to hire 27 new employees in a push for profitability
News Security
Facebook’s Zuckerberg Questions Privacy Expectations
Privacy is no longer a social norm, according to the founder of Facebook, Mark Zuckerberg commenting on the rise of social networking
Visa Receives £37m Over Data Breach Incident
Heartland Payment Systems agrees to pay as much as $60 million (£37m) to Visa to address losses by credit and debit cardholders affected by the data breach Heartland suffered in 2008
Microsoft Issues First Security Patch Of 2010
Microsoft is planning to plug a Windows security hole rated critical for Windows 2000 systems, in the company's first Patch Tuesday of the year
Cisco Acquires Security Start-up Rohati Systems
Cisco says it has bought Rohati Systems, a company specialising in agentless transaction networking systems
Iomega Offers Virtual PC Clones
Storage provider Iomega is now offering technology that will allow users to keep a virtual copy of their computer in their pocket
Social Networking Suicide Can Be Painful
Security expert condones Facebook's decison to block Web 2.0 Suicide Machine, which deletes profiles from the social networking site
Review: IBM’s Proventia Management SiteProtector
IBM's Rational AppScan and ISS Proventia IPS GX5108 combine proactive application vulnerability scanning with live IPS attack reports to provide powerful web application protection.
U2’s Bono Stage Dives Into File-Sharing Debate
The Irish rocker has cited China's clampdown on online free speech as evidence that ISPs could do more to tackle illegal sharing of movies and music
EMC Acquires Risk Specialist Archer Technologies
EMC has acquired governance, risk and compliance software maker Archer Technologies
Kingston Admits To Secure USB Drive Flaw
There are red faces over at Kingston after the company admitted that a number of its encrypted USB sticks can be hacked, and asked customers to return the affected drives
Symantec Reveals SaaS Plans For 2010
The security company has discussed its plans for the SaaS space in the coming year
Security Holes Discovered In Google Calendar and Twitter
A security researcher uncovered some holes in Google Calendar and Twitter that may allow an attacker to steal cookies and user session IDs
TJX Hacker Admits To More Hacking Charges
TJX hacking mastermind Albert Gonzalez is facing a longer stretch in prison after pleading guilty to yet more hacking charges
Microsoft Downplays Concerns Of IIS Zero-Day Bug
Microsoft is attempting to downplay concerns over a security vulnerability in IIS, and insists it would need an insecure configuration to be exploited
Security Worries Over Smuggled Mobiles In Prison
The number of illegal mobile phones and SIM cards in prison has trebled in just two years leading to concerns that they could be helping to fuel crime and terrorism
Mobile Industry Downplays Cracking Of GSM Code
The mobile industry has downplayed worries that GSM phone users are now vulnerable to having their telephone calls intercepted
Obama Finally Appoints US Cyber-Security Chief
U.S. President Barack Obama has chosen Howard Schmidt to step into the role of cyber-security coordinator
Scareware On The Rise Over 2009 Says FBI
From serving malicious ads to poisoning search engine results for recently deceased actress Brittany Murphy, rogue antivirus operations have been going strong all year
Cisco Helps Cops Capture Crooks With Video Cloud
The networking giant's technology is being used to underpin an online evidence repository developed by stun-gun maker Taser International
Illegal File-Sharing Rife In UK, Claims BPI
Illegal file-sharing is as widespread as ever, despite plans for new government legislation to cut off pirates, but Rage Against the Machine proves there is still hope for legal downloading
Details Emerge Of Latest Twitter Attack
The attack that took down Twitter on 17 Dec. used legitimate credentials to log in and redirect Twitter.com to a site purporting to be under the control of the Iranian Cyber Army
UK Government e-Borders Scheme In Disarray
The government's decision to gather personal data on every traveller into and out of the UK is under threat from EU rules concerning free movement
Iraqi Militants Hack US Predator Drones
Militants have hacked Predator drone feeds using software that costs less than $30, but US military officials insist hackers have not been able to disrupt the drone missions
Twitter Hacked By Iranian Cyber Army
Twitter was hijacked between 10pm and 11pm Pacific time on 17 December, and was replaced it by a screen which read: "This Website Has Been Hacked by Iranian Cyber Army"
Symantec Targets Mobile Devices With New Offerings
In a sign of the increasing proliferation of mobile devices in the workplace, Symantec has rolled out three solutions in order to secure and control them
Review: Sophos Endpoint Security and Data Protection 9
Sophos Endpoint Security and Data Protection 9 is a solid contender in the enterprise endpoint security market, with strong deployment and a streamlined management GUI
MPs Join Protest Over McKinnon Extradition
The Liberal and Conservative leaders protest outside the Home Office, while the Home Secretary says hacker Gary McKinnon must face charges
New Adobe Zero-Day Vulnerability Discovered
More bad news for Adobe after a new vulnerability affecting Reader and Acrobat has been uncovered, with attacks already under way
Europe Talks Tough On Piracy and Copyright
Organised criminals are "freeloading on the ingenuity" of others, according to the European Commission