Data Protection — News

Rema Tip Top studies tablets following security upgrade

By Hamish Barwick | 26 September, 2011 09:43

Automotive and industrial products company Rema Tip Top Australia has begun the process of a tablet review following the implementation of a new firewall system.

iPhone 5 dream a BYO security nightmare

By David Braue | 29 September, 2011 12:17 | 2 Comments

If your company is like most, you've been wrestling carefully with the security protections necessary to manage demand for bring-your-own (BYO) computing policies. You may even work at Suncorp or one of the other organisations, that have embraced the idea as a way to reduce IT costs and boost employee satisfaction.

Firefox 7 seekers warned to beware of bogus website

By John P. Mello, Jr. | 29 September, 2011 05:20

If you're using a search engine today to find a download of Firefox 7, be careful about the results you click on. That's because a dubious website called Firefox7.org appears high up in those results.

Argonne researchers 'hack' Diebold e-voting system

By Jaikumar Vijayan | 29 September, 2011 02:04

Researchers at the Argonne National Laboratory this week showed how an electronic voting machine model that's expected to be widely used to tally votes in the 2012 elections can be easily hacked using inexpensive, widely-available electronic components.

Anatomy of a cunning APT: the SK Communications breach

By Liam Tung | 29 September, 2011 09:00 | 1 Comment

The hackers that breached South Korean SK Communications in July, gaining access to 35 million Nate and CyWorld social network users, executed a cunning attack that relied on compromised infrastructure spanning several countries.

Catching up with mobile security threats

By Elisabeth Horwitt | 29 September, 2011 08:29

Development of enterprise mobile apps has been moving more slowly than development of consumer-facing apps, according to Gartner. One main reason is IT leaders' concerns about the security of mobile devices, which are often employees' personal devices, and are vulnerable to being lost, hacked or stolen. While there are plenty of established tools and practices for keeping Web visitors from straying (or hacking) into sensitive corporate data, managing security across a diverse set of mobile devices remains a challenge, IT experts say.

Mozilla puts Firefox 7 on memory diet, patches 11 bugs

By Gregg Keizer | 29 September, 2011 06:31

Mozilla yesterday patched 11 vulnerabilities in the desktop edition of Firefox as it upgraded the browser to version 7.

Box.net boosts Sync, security features

By Stephen Lawson | 29 September, 2011 05:38

Box.net bumped up security and synchronization on its content management and sharing platform and teamed up with Hewlett-Packard and Motorola Mobility for pre-installation deals at its BoxWorks user conference in San Francisco.

Microsoft's botnet take-down helps protect Mac users

By Gregg Keizer | 29 September, 2011 05:27

Mac users can thank Microsoft for taking down a small but dangerous botnet.

Mac OS X Lion: Losing its security pride

By George V. Hulme | 29 September, 2011 01:57

The past couple of weeks have not been the best for Mac OS X's security reputation.

App Protects Facebook Users from Malicious Links

By John P. Mello Jr. | 29 September, 2011 08:50 | 2 Comments

"Security" isn't usually linked with "fun," but a Finnish security is taking a stab at connecting the two with its new application. F-Secure's ShareSafe app runs inside Facebook and flags links to dangerous websites before you post them to your friends' walls (or your own).

Tips for better mobile security

By Matt Rodgers | 26 September, 2011 12:25

In the last 18-months, the mobile computing landscape has changed completely. People are bringing their own computers to the office and carrying smartphones and tablet devices that are as powerful as desktop computers were only a short while ago. Here’s how to make sure these devices don’t compromise your organisation.

Microsoft spikes third botnet and Mac fake AV host

By Liam Tung | 28 September, 2011 06:31

Microsoft has pulled off its third technical and legal botnet takedown, this time aimed at the Kelihos botnet and a domain responsible for the recent spate of MacDefender malware attacks on Mac users.

BoxTone blends mobile device control with enterprise directories, policies

By John Cox | 28 September, 2011 01:31

BoxTone has released a new version of its mobile device management software, which now works with existing enterprise policy-setting and security tools. This integration lets enterprise IT staff apply those tools to mobile users.

Microsoft promises patch to block BEAST attacks

By Gregg Keizer | 28 September, 2011 06:43

Microsoft today said it will issue a Windows security update to plug a long-known hole in the protocol that secures websites.

Microsoft offers ideas for users to beat the BEAST threat

By Tim Greene | 28 September, 2011 02:26

Microsoft is urging customers to update vulnerable versions of SSL to a newer one that is not susceptible to a recently published exploit called BEAST, but in the meantime it recommends steps that lessen the risk of being victimized.

Russia blames US and Israel for Stuxnet worm

By John E Dunn | 28 September, 2011 00:04

Russia has for the first time laid the blame for the Stuxnet worm at the door of the US and Israel, describing it as "the only proven case of actual cyber-warfare."

Apple updates OS X to block Mac Trojan

By Gregg Keizer | 27 September, 2011 20:47

Apple has updated the bare-bones antivirus protection included with Mac OS X to detect a Trojan horse that poses as a PDF document.

Schumer seeks FTC probe of OnStar privacy policy

By Jaikumar Vijayan | 27 September, 2011 21:09

GM subsidiary OnStar's plan to collect and share GPS tracking and other data from vehicles even after their owners stop subscribing to its service has prompted an outcry from some lawmakers.

Gang of Zeus-driven bank thieves put out of business

By Tim Greene | 27 September, 2011 06:31

A mid-level organizer of an international online bank-theft ring that relied on the Zeus Trojan faces up to 45 years in prison when he is sentenced Jan. 13 after pleading guilty to conspiracy to commit bank fraud and possession of false IDs.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-420

In partnership, Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-420 systems.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.