More Security News
- 24 October 2013
-
News: Security tool delivers surprise insights to Domino's Pizza
Marketers at Domino's Pizza are gaining new and more immediate insights into online coupon usage from an unexpected source: a security management tool used by the national chain's IT department.
-
News: IBM study reveals best practices of information security officers
IBM's freshly released insights from its 2013 IBM Chief Information Security Officer Assessment, show that three areas impact security leaders, namely business practices, technology maturity and measurement capabilities.
-
News: CSO's 2013 Compass Award winners
Our 2013 CSO Compass Award winners all exemplify excellence, achievement and leadership in security
-
News: Merkel puts NSA spying on EU leaders' agenda
German Chancellor Angela Merkel said Thursday that allegations the United States’ National Security Agency hacked her phone is relevant for every citizen that needs to trust digital communications.
-
News: Oversharing information can lead to disaster online
Criminals use a variety of tools and tactics when selecting victims and conducting attacks. But information is the key to any malicious campaign, and the more personal it is, the more value it holds. When one goes about their daily life online, how much information is too much, and what should be protected?
-
News: Germany summons US ambassador over Merkel phone-spying allegations
Germany's foreign minister has summoned the U.S. ambassador to Berlin to discuss allegations that the mobile phone of Chancellor Angela Merkel has been monitored by American intelligence services.
-
News: Apple iCloud Keychain in OS X Mavericks gets mixed reviews
Security researchers have mixed opinions about the new password manager Apple has included with Mavericks, the latest version of the Mac OS X operating system.
-
News: Cisco fixes serious security flaws in networking, communications products
Cisco Systems released software security updates Wednesday to address denial-of-service and arbitrary command execution vulnerabilities in several products, including a known flaw in the Apache Struts development framework used by some of them.
-
News: Irish High Court to review Facebook Prism complaint
The Irish High Court is going to review whether the Irish Data Protection Commissioner's refusal to investigate Facebook's involvement with the U.S. government surveillance program Prism was lawful.
- 23 October 2013
-
News: Flash Player now sandboxed under Safari on Mac OS X
Adobe has worked with Apple to sandbox Flash Player under Safari in Mac OS X, restricting the ability of attackers to exploit any vulnerabilities they might find in the browser plug-in.
-
News: 4 ways metrics can improve security awareness programs
Useful and legitimate metrics have long evaded the information security community as a whole. Without proper metrics, you cannot truly prove the value of a security program. This makes it difficult to justify increasing the budget and even maintaining the budget that you have.
-
News: Germany says US may have spied on Merkel's mobile phone
U.S. intelligence agencies may have spied on German Chancellor Angela Merkel's mobile phone, which would be a "grave breach of trust," the German government said late Wednesday.
-
News: Mark Weatherford: The Veteran
Weatherford, a principal at The Chertoff Group, understands security from both governmental and commercial perspectives
-
News: Vulnerabilities in some Netgear router and NAS products open door to remote attacks
Vulnerabilities in the management interfaces of some wireless router and network-attached storage products from Netgear expose the devices to remote attacks that could result in their complete compromise, researchers warn.
-
News: Scott Pettigrew: The Builder
Over the course of his eclectic career, Pettigrew, who's now CSO at HMS, has assembled three security departments from the ground up
-
News: Even the tech-savvy are prone to compromise
The millennial generation, those of us who were born and raised alongside the Internet, should be wise enough to avoid account hijackings and other scams, but we're not. In fact, one out of four millennials have admitted to having at least once incident where an online account was hacked.
-
News: Despite drop in fraud, businesses told to remain vigilant
Lower fraud rates are giving many companies a false sense of security and U.S. organizations are particularly good at ignoring trends that point to the need for vigilance, a global study found.
-
News: EU leaders consider tougher taxation of online service providers
European Union leaders will meet to discuss the digital economy for the first time on Thursday.
-
News: Microsoft and Symantec push to combat key, code-signed malware
An alarming growth in malware signed with fraudulently obtained keys and code-signing certificates in order to trick users to download harmful code is prompting Microsoft and Symantec to push for tighter controls in the way the world's certificate authorities issue these keys used in code-signing.
-
News: Websense launches Triton 7.8
Websense has unveiled an updated Triton defense system which covers every stage of the targeted threat kill-chain to give organisations greater protection from targeted attacks.
-
1:
New Nexus 10 2 (2013) vs iPad Air specs comparison review; how do Google & Apple tablets compare?
-
2:
Google Nexus 5 release date, price, photos, video and specs rumours
-
3:
LG G2 review: The best smartphone you can buy
-
4:
Argos MyTablet vs Tesco Hudl comparison review: The battle of the budget tablets
-
5:
Lenovo Yoga Tablet 10 and Yoga Tablet 8 hands-on review
-
1:
Google Nexus 5 release date, price, photos, video and specs rumours
-
2:
Nexus 10 2 (2013) release date, price and spec rumours
-
3:
iPhone 6 release date: When will the iPhone 6 be launched?
-
4:
Apple iPad mini with Retina display: release date and specifications in the UK
-
5:
PS4 release date, specs and its backwards compatibility issues: What you need to know about the PlayStation 4
-
1:
New Nexus 10 2 (2013) vs iPad Air specs comparison review; how do Google & Apple tablets compare?
-
2:
LG G2 review: The best smartphone you can buy
-
3:
Argos MyTablet vs Tesco Hudl comparison review: The battle of the budget tablets
-
4:
Lenovo Yoga Tablet 10 and Yoga Tablet 8 hands-on review
-
5:
Microsoft Surface Pro 2 review: A compact Ultrabook laptop and tablet with compromises
-
1:
How to close running apps in iOS 7: iPhone now works like Android
-
2:
How to set a song on your iPhone as a ringtone
-
3:
How to block a number on an iPhone in iOS 7, iOS 6
-
4:
How to format a write-protected USB flash drive or memory card
-
5:
How to open Adobe CS Photoshop, InDesign in OS X Mavericks - quick fix
Latest Videos
HP Chromebook 11 video review: a great-looking but flawed Google laptop
At ÂŁ229 and weighing only a kilogram, the new HP Chromebook 11 looks like a tempting deal. Watch our video review to find out if it's the right choice for you.
-
Tesco Hudl video review - why wouldn't you buy Tesco's cheap Android tablet?
-
LG G2 video review - a great Android smartphone at a good price
-
Galaxy Note 3 video review - why Samsung's latest 6in Android phablet is great
-
Dell Venue 11 Pro in video - a demonstration of Dell's new 10in touchscreen tablet
Latest Reviews
-
New Nexus 10 2 (2013) vs iPad Air specs comparison review; how do Google & Apple tablets compare?
We compare the specifications of the iPad Air and the new Nexus 10 2 (2013). Find out more about…
-
Alienware 14 review: portable gaming laptop that delivers on style and performance
The Alienware 14 gaming laptop looks great and has the performance to match. Read our Alienware…
-
Asus MB168B+ 15in display review: portable USB monitor offers high class performance and ease of use
The Asus MB168B+ is a portable 15in 1080p USB monitor that is easy to set up and great for HD…
Latest How-To
-
Save your Internet bacon with two-factor authentication
Why log in once when you can log in twice? Two-factor authentication can give you some added protection, and it's easy to set up.
-
How to turn off inline images using Twitter's mobile app
You don't have to suffer through photos in your Twitter timeline. Banish them with just a few taps.
-
How to remove locations from your Facebook posts
Turn off Facebook's location settings