Data Protection — News
Automotive and industrial products company Rema Tip Top Australia has begun the process of a tablet review following the implementation of a new firewall system.
If your company is like most, you've been wrestling carefully with the security protections necessary to manage demand for bring-your-own (BYO) computing policies. You may even work at Suncorp or one of the other organisations, that have embraced the idea as a way to reduce IT costs and boost employee satisfaction.
If you're using a search engine today to find a download of Firefox 7, be careful about the results you click on. That's because a dubious website called Firefox7.org appears high up in those results.
Researchers at the Argonne National Laboratory this week showed how an electronic voting machine model that's expected to be widely used to tally votes in the 2012 elections can be easily hacked using inexpensive, widely-available electronic components.
The hackers that breached South Korean SK Communications in July, gaining access to 35 million Nate and CyWorld social network users, executed a cunning attack that relied on compromised infrastructure spanning several countries.
Development of enterprise mobile apps has been moving more slowly than development of consumer-facing apps, according to Gartner. One main reason is IT leaders' concerns about the security of mobile devices, which are often employees' personal devices, and are vulnerable to being lost, hacked or stolen. While there are plenty of established tools and practices for keeping Web visitors from straying (or hacking) into sensitive corporate data, managing security across a diverse set of mobile devices remains a challenge, IT experts say.
Mozilla yesterday patched 11 vulnerabilities in the desktop edition of Firefox as it upgraded the browser to version 7.
Box.net bumped up security and synchronization on its content management and sharing platform and teamed up with Hewlett-Packard and Motorola Mobility for pre-installation deals at its BoxWorks user conference in San Francisco.
Mac users can thank Microsoft for taking down a small but dangerous botnet.
The past couple of weeks have not been the best for Mac OS X's security reputation.
"Security" isn't usually linked with "fun," but a Finnish security is taking a stab at connecting the two with its new application. F-Secure's ShareSafe app runs inside Facebook and flags links to dangerous websites before you post them to your friends' walls (or your own).
In the last 18-months, the mobile computing landscape has changed completely. People are bringing their own computers to the office and carrying smartphones and tablet devices that are as powerful as desktop computers were only a short while ago. Here’s how to make sure these devices don’t compromise your organisation.
Microsoft has pulled off its third technical and legal botnet takedown, this time aimed at the Kelihos botnet and a domain responsible for the recent spate of MacDefender malware attacks on Mac users.
BoxTone has released a new version of its mobile device management software, which now works with existing enterprise policy-setting and security tools. This integration lets enterprise IT staff apply those tools to mobile users.
Microsoft today said it will issue a Windows security update to plug a long-known hole in the protocol that secures websites.
Microsoft is urging customers to update vulnerable versions of SSL to a newer one that is not susceptible to a recently published exploit called BEAST, but in the meantime it recommends steps that lessen the risk of being victimized.
Russia has for the first time laid the blame for the Stuxnet worm at the door of the US and Israel, describing it as "the only proven case of actual cyber-warfare."
Apple has updated the bare-bones antivirus protection included with Mac OS X to detect a Trojan horse that poses as a PDF document.
GM subsidiary OnStar's plan to collect and share GPS tracking and other data from vehicles even after their owners stop subscribing to its service has prompted an outcry from some lawmakers.
A mid-level organizer of an international online bank-theft ring that relied on the Zeus Trojan faces up to 45 years in prison when he is sentenced Jan. 13 after pleading guilty to conspiracy to commit bank fraud and possession of false IDs.
Sign up now »
In partnership, Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-420 systems.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.