MongoDB's database management system has a growing presence in big data decision making in the insurance industry, according to the company
News secure-it
Chrome Browser Version 32 Adds Tab Indicators, Security Features
Google's latest Chrome browser ushers in features including indicators for tabs running audio or video applications, security fixes and more
Quiz Of The Week: Edward Snowden And the NSA
Edward Snowden's revelations of NSA surveillance have sparked arguments round the world. How well do you know the story?
Man Jailed For Refusing To Reveal USB Password
Syed Hussain, already serving time for helping to plot attacks against UK targets, got another four months
NSA ‘Can Hack Disconnected PCs’
NSA installs radio bugs in PCs, reports say
Has Microsoft Finally Secured Internet Explorer?
For once, there are no fixes for Internet Explorer on Patch Tuesday. Sean Michael Kerner welcomes Microsoft's progress in securing its browser
Microsoft And Oracle To Patch Scores Of Vulnerabilities
Oracle issues a whopping 144 patches, including a handful for much-exploited Java
Target Attackers May Have Used RAM Scrapers
Software that pulls card numbers from computer memories is a growing threat, and may have been used in two recent heists, according to experts
UK Government Tells People To Be More Careful Online
Citizens urged to be more “cyber streetwise”
After Target, Retailers Need Better Security
The Target breach exposed how weak security is at shops. Wayne Rash wants to see biometrics
Insured Bitcoin ‘Vault’ Launched In UK
UK-based Elliptic says it has a cheap and secure way of protecting bitcoin owners from theft and loss
Anonymous Hits MIT Site On Anniversary Of Aaron Swartz’ Death
A year on from Aaron Swartz's suicide, hacktivist group hits MIT again
Over 70 Million Customers Hit In Target Hack
Significantly higher than the 40 million customers originally thought compromised
LinkedIn Sues Crew Who Scraped Member Profiles Using Amazon Servers
LinkedIn wants compensation and a jury trial, saying it could determine who the attackers were by asking Amazon
OpenSUSE Forums Down After Breach
Another vBulletin-based attack causes problems for open source crew
So Really – Why DID Intel Dump The McAfee Name?
John McAfee was a liability, and the Intel brand is stronger, says Sean Michael Kerner
Coinye Currency Launches Despite Threats From Kanye West
Kanye West's cease and desist letter gives the Coinye currency a publicity boost
Security Luminaries Call For RSA Tech Boycott Over NSA ‘Collusion’
Security chiefs and researchers say the best way to send a message to RSA is to stop using its products
Cryptolocker Variant Automatically Infects USB Drives
A newly discovered variant of the file-encrypting Cryptolocker ransomware automatically propagates via USB storage, according to researchers
Bruce Schneier Joins Co3 To Develop Incident Response Software
Schneier will work alongside CEO John Bruce, an associate from his days at Counterpane Security
TorrentFreak News Site Blocked By Sky Porn Filter
More fury at filters blocking non-offensive websites
Thousands Infected By Malicious Ads On Yahoo
Brits hit hard as malicious ads serve up the Magnitude exploit kit
IT Firms Probe NSA Allegations
Cisco, Dell and others are investigating claims that the NSA compromised their products
Facebook Sued Over Message Scanning Allegations
Facebook has been slapped with a lawsuit over allegations it scans the private messages of users
Can European Telcos Protect Customers From The NSA?
European telcos could ease customers' fear of US-based surveillance, if they can build the right services, says Birger Steen
Millions Of Snapchat Usernames And Phone Numbers ‘Leaked’
Hackers claim they wanted to show up Snapchat security weakness
Syrian Electronic Army Hacks Skype Social Pages And Blog
Hackers leave anti-NSA spying messages across Microsoft-run accounts
Apple Denies NSA Backdoor For iPhone
Apple denies it created a backdoor to allow the NSA to spy on the iPhone
Crooks Rob Cash Machines Via USB
Cash machines running Windows XP attacked, researchers at the Chaos Communication Congress say
Report: NSA ‘Uses Vulnerabilities To Exploit Networking Gear’
The US' National Security Agency has an internal list of security vulnerabilities that it uses to place surveillance code into networking equipment, according to a report