Barracuda Networks Inc. today announced it has doubled the capacity available to customers of its backup service while keeping the price the same.
Amazon Web Services will introduce new capabilities for enterprises on Thursday, including identity federation and support for private network connections to AWS.
We've dug through the jungle that is Microsoft Downloads and found 15 of the best free tools you've probably never heard of.
Standards body the IEEE has called for proposals to build a catalogue of people using binary “packers”, the software tools often used by malware writers to hide executable files from antivirus products.
Every major corporation harbouring valuable information has been compromised, but only some know it, according to executives at McAfee and RSA.
Security product provider Rapid7 has updated its widely used open-source Metasploit exploitation framework, expanding the software so it supports enterprise IT security staff as well as its core audience of penetration testers.
LAS VEGAS --Warnings about emerging cyberthreats shouldn't be treated with the same skepticism that many government officials showed toward the alarms sounded prior to the Sept. 11, 2001, terrorist attacks, warned a leading counter-terrorism at the BlackHat security conference here Wednesday.
While 69 percent of organizations have employees using personal devices to connect to their corporate network, more than one-fifth, or 21 percent, currently have no policy in place to govern the use of personal mobile devices on their network. These new figures, released recently from security-products firm Courion, suggest many security leaders are still ignoring the need to address mobile-device management among their employees.
Using data collected from its Mobile Threat Network, Lookout today released a full report on the state of mobile malware and security. The report covers both Android and iOS, and compares the risks that both platforms face. You can view and download the full report on Lookout's blog, but here are a few of the highlights:
Soon, SAP hopes to sew up a gaping security hole for its 7,000 iPad-toting employees. The Germany-based tech giant is beta testing a product that will allow it to send PGP-encrypted confidential email to employees. In turn, employees will be able to decrypt them using a Symantec viewer iPad app.
Hacker groups such as Anonymous and Lulz Security may need to be monitored more closely in the event they are assisted by other hackers with higher skill levels and decide to strike critical infrastructure.
Before the Internet, passwords played only a tiny role in everyday life. Think about it: Except for your ATM PIN, what important codes did you need to remember? Probably none. But now, you can’t click a link without hitting another site that requires a password. Doesn’t matter if it’s a big-name destination like Google Docs or Mint.com, or a smaller, more private site such as your local library or company intranet. You want in? Password, please.
An explosion in mobile malware during the last six months has more than doubled the chance that a user's Android smartphone will become infected, a security researcher said today.
Companies relying on Cloud services from Amazon were in April left hanging when the Cloud provider’s EC2 went down. For Gartner research director, Rob McMillan, this outage highlighted the need for airtight service level agreements (SLAs) to ensure their provider’s — and therefore their data’s — reliability.
Data governance, risk and compliance (GRC) should be viewed by IT managers as a business asset rather than something for the law firm to deal with, according to an IDC US senior analyst.
Web applications experience 27 attacks per hour on average — roughly one attack every two minutes — according to findings from a US-based data security provider.
Section 922 of the Dodd-Frank Wall Street Reform and Consumer Protection Act --- increasing the protection for whistleblowers -- amends the Securities and Exchange Act of 1934 by allowing the Securities and Exchange Commission to offer awards to individuals providing original information about a violation of federal securities regulations. Next Friday, on Aug. 12, these whistleblower provisions go into effect.
Hacker group LulzSec ("the world's leaders in high-quality entertainment at your expense") has had its initial Google+ account nixed this week, though LulzSec has quickly and brashly re-emerged with a new one
Sign up now »
Reduce fraud losses regardless of channel by preventing cybercrime, identity theft, and other threats targeting your customers.
- FTLead Software EngineerSA
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTOS Web Applications DeveloperNSW
- FTTest Analyst (MS Environment) .netNSW
- FTTest EngineerVIC
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest Analyst (MS Environment) .netNSW
- FTSenior Python DeveloperNSW
- FTQuality ManagerSA
- FTR&D EngineerSA
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.