News
Endpoint security
-
April 11, 2013
11
Apr'13
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations
-
April 11, 2013
11
Apr'13
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher
-
April 03, 2013
03
Apr'13
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe
-
March 20, 2013
20
Mar'13
Case study: Hamilton Fraser embraces BYOD with MobileIron
How insurance firm Hamilton Fraser is using MobileIron to enable employees to bring their own devices while following company policy
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
February 27, 2013
27
Feb'13
350,000 different types of spam SMS messages were targeted at mobile users in 2012
350,000 different variants of unsolicited spam SMS messages were accounted for in 2012, with 53,000 variants logged for December alone
-
February 27, 2013
27
Feb'13
Health records should be protected like bank details, says BCS
The BCS and NHS say people should protect their online medical records in the same way they look after their bank details
-
November 19, 2012
19
Nov'12
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software
-
November 16, 2012
16
Nov'12
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff
-
November 13, 2012
13
Nov'12
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed
-
October 31, 2012
31
Oct'12
Apple squashes BlackBerry as Brent Borough deploys iPads
Brent Borough Council replaces BlackBerry and deploys MobileIron to securely manage almost 3,000 iPads and iPhones
-
October 31, 2012
31
Oct'12
Free mobile apps a threat to privacy, study finds
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information
-
October 30, 2012
30
Oct'12
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows
-
October 10, 2012
10
Oct'12
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys
-
September 25, 2012
25
Sep'12
BYOD: IT must tackle printer security
With more staff bringing their own devices to work, IT needs to rethink its printing and scanning policies
-
September 25, 2012
25
Sep'12
Security concerns hold back mobile banking adoption
More than two-thirds of smartphone owners have not yet adopted mobile banking apps because of security concerns, a survey has revealed
-
May 18, 2012
18
May'12
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products.
-
December 29, 2011
29
Dec'11
Emerging 2012 security trends demand information security policy changes
2012 security trends involving cookies, fines, devices and threats will demand more skills -- and a little finesse -- from security professionals.
-
December 05, 2011
05
Dec'11
Concerned about tablet security issues? Some are, others not so much
Users love their tablets, but security pros are concerned about tablet security issues. However, though tablets bring new threats, not everyone is ringing the alarm.
-
July 27, 2011
27
Jul'11
Metasploit Pro 4.0 adds support for cloud, SIEM systems
Rapid7 releases Metasploit Pro version 4 with improved automation features and new SIEM and cloud-based pen-testing support.
-
July 13, 2011
13
Jul'11
Managing iPads in enterprise networks
These days users expect to be able to use their iPads inside the business and as thousands of software vendors release applications for the iOS platform which provide data mobility and usability benefits to employees, the prospect of the iPad as a ...
-
July 06, 2011
06
Jul'11
Network security case study: College’s NAC virtual appliance makes grade
Wellington College’s network security case study explains how a NAC virtualization appliance blocks malware and provides increased capacity on demand.
-
June 30, 2011
30
Jun'11
Apple fixes 39 bugs in Snow Leopard, preps for Lion release
Releases final non-security update - v10.6.8- for Snow Leopard OS, which fixes 39 flaws. More details inside.
-
June 23, 2011
23
Jun'11
Cisco introduces AnyConnect to mobile devices
The benefits of enabling your workforce with mobile access to enterprise applications, regardless of whether those applications are in the cloud or in the corporate data centre, are clearly recognised. The ease of providing secure remote access to ...
-
June 22, 2011
22
Jun'11
McAfee releases Android end point security solution
McAfee have announced McAfee Mobile Security software, available for both smartphones and tablets, which according to a recent press release provides a comprehensive mobile security solution by combining three leading McAfee mobile security products...
-
June 09, 2011
09
Jun'11
Nessus Android application extends vulnerability scanner’s mobile reach
Free Android app for Nessus Vulnerability scanner released by developers, Tenable Network Security Inc; extends Nessus’s existing support for iOS devices.