Security »
-
Botnet masters hide command and control server inside the Tor network
Security researchers from German antivirus vendor G Data Software have identified a botnet that is controlled by attackers from an Internet Relay Chat (IRC) server running as a hidden service inside the Tor anonymity network.
-
Hurricanes, floods, fiber cuts keep IT pros on their toes
Many companies are prepared for a disaster, with plans and technologies in place to help sustain operations in the wake of severe weather, hardware failures, human error, and accidents. But not every company is covered.
-
Connections: Looking to the future of business communications
Enterprise communications is being significantly influenced by a series of trends -- many of which originate from the consumer market, particularly from Generation Y -- that are changing the way organizations do business.
-
Permanent cybersecurity team established for EU institutions
European institutions on Wednesday beefed up their cyber security by establishing a permanent Computer Emergency Response Team (CERT-EU).
-
Cisco looks to secure the data center with new releases
Cisco this week introduced a set of security products designed to fortify data centers as they consolidate, virtualize and morph into clouds.
-
Domino's Pizza India operation says website hacked
The website of Domino's Pizza India was hacked, but customers' information was not compromised, the local franchisee Jubilant FoodWorks said on Wednesday.
-
iPhone 5 has Wall Street in a tizzy
It’s going to be hard to top Topeka Capital analyst Brian White’s comment to clients that the anticipated Apple iPhone 5 launch this Wednesday could be the “biggest upgrade in consumer electronics history.” But plenty of other Wall Street analysts aren’t holding back either.
-
EMV protocol flaw allows 'pre-play' attacks against chip-enabled payment cards, researchers say
Many automated teller machines (ATMs) and point-of-sale (POS) terminals fail to properly generate random numbers that are required by the EMV protocol to securely authenticate transaction requests, according to a team of researchers from the University of Cambridge in the U.K.
-
Microsoft backpedals, promises to patch Windows 8's Flash 'shortly'
Microsoft today said it would update Flash on Windows 8 "shortly," although it declined to set a timetable.
-
Microsoft's September Patch Tuesday load lighter than usual
Microsoft gave IT departments a break this month, issuing just two patches in its September Patch Tuesday release. Separate security updates should keep some busy through the month, though.
-
Low-cost RADIUS servers for Wi-Fi security
Remote Authentication Dial-In User Service (RADIUS) servers are common in enterprise networks to offer centralized authentication, authorization and accounting (AAA) for access control. But RADIUS servers can also be useful in small and midsize networks to enable 802.1X authentication and WPA2 (802.11i) security for Wi-Fi nets.
- 7/9
10 essential WordPress plugins
- 6/9
4 security suites that protect all your devices
- 22/8
Review: Google Compute Engine rocks the cloud
- 13/8
DLP tools deliver strong endpoint protection
- 13/8
Cisco Ironport delivers strong email protection
- 13/8
How we tested DLP products
- 9/8
First look: Windows Azure Active Directory preview
- 16/7
First look: Microsoft Office 2013
- 16/7
Microsoft raises the bar with SQL Server 2012
-
The Grill: NASA's Adrian R. Gardner works to manage cybersecurity challenges
Adrian R. Gardner, CIO at NASA's Goddard Space Flight Center, was the 2012 recipient of the Information Technology Leader Award from Temple University's Fox School of Business. Here, he talks about what it takes to lead IT at one of the most famous government organizations.
Security Manager's Journal: DLP tool is suddenly blind to email
yARN: The rise of the social picture gadget
Once an outcast, help desk now stars at TVA
Five key takeaways from Workday's IPO filing
Google should speed up Apps' enterprise social networking development
Best BYOD management: Containment is your friend
Developing apps for the mobile cloud: What you need to know
Social networking just got real
IT's 9 biggest security threats
Online travel takes off with EV SSL security
Furniture maker uses NAC gear for more than NAC
How does the CIA keep its IT staff honest?
Employment firm trains staff in compliance with network management kit
Uni fortifies Western Front with IDS
Law firm stop unsolicited mail with software-as-a-service
Trojan horse payload strikes recruiter
Junior soldiers protected by patches
The Observatory Hotel makes spam an unwelcome visitor
Air force base adopts modern alert system
These companies help with everything from BYOD to MPLS backup, security management and enterprise search
Security Manager's Journal: Handling zero-days with zero staff
IT needs to use metrics to move out of the shadows
Security can still make or break mobile-payment systems
Thornton May: Futuring should be job No. 1 for IT
Social Media Toolkit: Example Acceptable Usage Policy
This policy applies to your use, access and disclosure of messages composed, sent or received using your computer systems and/or internet use. The policy aims to protect our business systems for our mutual benefit and applies to both internal and external communications and to all employees who work for us. Read more.
Lavasoft Ad-Aware Free
Ad-Aware Free has long been one of the most popular spyware killers on the planet, and with good reason. It's simple to use, does an ...
Case Study: Gadens Law Firm Reclaims 22 Hours of Lost Productivity Each Month
For the past eight years, Gadens Brisbane has used a “big three” security vendor to protect its network against malware and other threats. Despite deploying a complete antivirus package, the firm still experienced up to three infections across the network every week. This gap in security meant the firm’s IT team was spending up to six hours a week on security management, resulting in lawyers being unable to work on their computers for hours a time – an inconvenience for the individual, and costly for a business reliant on hourly charging. Read how Gadens Law Firm have reduced their security management time from about 6 hours a week to 30 minutes a week.
- FTICT Service Delivery Specialists Level 3ACT
- CCSAP Security Project ManagerNSW
- CCSAP Cutover ManagerNSW
- FTICT Service Delivery Specialists Level 4/5ACT
- CCSAP Functional Payroll ConsultantNSW
- CCLead Abinitio ArchitectNSW
- FTProduct Manager Strategist - Enterprise ApplicationsNSW
- FTSAP Project ManagerNSW
- FTApplication Support - C#NSW