A previously unknown vulnerability exploiting an ActiveX component in Internet Explorer targeting XP and Windows 2003 users is spreading across the web
News Security
Reputation Technology Debuts In Symantec’s Norton Beta
Symantec unveils reputation-based technology codenamed ‘Quorum' in the latest versions of Norton Internet Security and Norton AntiVirus
Microsoft Prepares For Summer IE8 Enterprise Push
Microsoft will push Internet Explorer 8 out to the enterprise in August as part of its Windows Server Update Services
Report: Enterprise PC Lifecycle Should Last Three Years
The cost of keeping an old PC instead of upgrading to a new one is impacting businesses around the world, according to a survey by Techaisle
Terror Law Adviser Slams McKinnon Extradition
A Home Office advisor has written to the Home Secretary to stall the extradition of military systems hacker Gary McKinnon to the US.
BT Does U-Turn And Drops Phorm
BT has abandoned its plans to use the the controversial web monitoring tool on to its broadband users, in favour of "interest-based" ads.
Hacker Releases iPhone 3GS Unlocking Tool For Windows
The same hacker to unlock Apple's first iPhone has struck again with an iPhone 3GS tool currently available for Windows only.
China’s Green Dam Is Back – And Aiming At Apple
Campaigners celebrated too soon: China has said it will press ahead with its Green Dam filtering software - and a version is coming for the Apple Macintosh
Mozilla Hurrying Firefox 3.5 Security Patches
Mozilla plans to release a patched version of its latest browser, to be named Firefox 3.5.1, in response to bugs that were revealed following the latest release.
Keeping Up With The Demand For Flexible Working
The modern flexible worker is more demanding than ever, says Mark Dixon. He's just overhauled the technology in his chain of Regus serviced offices
Apple Updates iPhone OS 3.1 SDK, Claim Reports
Apple pushed out its iPhone OS 3.1 software and the accompanying SDK for developers early 1 July, according to reports
Northumbria University Gets Wyse to Sustainable IT
A major new deployment of energy efficient thin client computers complements campus green-building design features as part of an environmental drive.
Firefox 3.5 Armed with Privacy Controls
Mozilla adds new privacy features to the latest version of Firefox in response to features in Internet Explorer 8, Apple Safari and Google Chrome
Cisco Pushes Beyond Traditional Roots To Challenge HP, IBM
Cisco chief John Chambers has pointed to new sectors it will either enter or grow in, bringing it into even greater competition with the likes of HP and IBM
Researcher Discovers Theft Of 88,000 FTP Credentials
A Trojan which stole 88,000 FTP credentials may have been in action for more than two years, say researchers
China Pulls “Unsafe” Green Dam Internet Filter
The Chinese Government's plan to require Green Dam Internet filtering software on all new PCs has been delayed indefinitely
Report Sees Big Growth Future for SaaS Security
A report from research firm Infonetics predicts software-as-a-service (SaaS) is the future of managed network security.
Pirate Bay Sold For £4.7 Million
The Swedish software firm buying Pirate Bay plans to use its brand together with new file-sharing technology to create a new, legitimate business model.
Microsoft To Open Green Cloud Dublin, Chicago Data Centres
Microsoft plans to roll out two new data centres in Dublin and Chicago in July, preparing for increased demand for cloud-based services such as Azure and Bing.
Sun Ray Users Get More Options With RingCube Desktop Virtualisation
Sun Microsystems and RingCube are joining forces to offer Sun Ray users more options when deploying a desktop virtualisation environment.
Tory Paper Demands Government Give Back Our Data
A new Conservative think tank report is calling for citizen-centric, open source IT development to put an end to wasteful, monolithic central government IT projects.
Social Networkers Are Slack On Internet Security
A Webroot survey has found those using social networks such as MySpace and Facebook are not doing enough to protect themselves from hackers and phishing scams.
Whitelisting: Is It Good Enough To Replace Anti-Virus?
An approved list of apps, or whitelist, is flavour of the month in security. But vendors and alanlysts question whether it can be a panacea
IBM Discovers Scheme To Manipulate Encrypted Data
A Researcher at IBM has found an encryption method that lets you operate on data without decrypting it: good news for the cloud and spam filters
Disaster Recovery The Achilles Heel Of Virtualisation
Many companies are not able to deploy separate backup data centre locations to provide the complete data-recovery system, relying instead on failover to separate storage arrays and servers within the same physical building
UK Cyber Security Agency Will Employ “Naughty Boys”
Britain's new Cyber Security Minister admits to counter-attack capability, and is accused of stealing President Obama's ideas, and eroding liberties
US Announces Plans For Cyber Command
Plans for the Cyber Command come a month after President Obama declared cyber-security a "national security priority" in a speech
Windows Security Essentials – Why Morro Might Shame Microsoft
Morro - now known as Windows Security Essentials - is a security update, and yet another admission from Microsoft that all is not well. This time the enterprise might wake up, says Don Reisinger
President Obama’s Take On Cyber Security
Technology executives praised the president's cyber-security strategy. But they liked Bush's recipe too: what has Obama cooked up?
Lost-Laptop Council Breached Data Rules
Stolen laptops had unencrypted personal data - and Manchester City Council's response may not be enough