Security » News »

  • IE easily beats Chrome, Firefox, Safari in malware detection

    Microsoft's combination of application reputation technology and URL filtering gave Internet Explorer a malware block rate that blew pass Google Chrome, Mozilla Firefox and Apple Safari.

  • Princeton CompSci prof wins prestigious award

    David Blei, a Princeton University computer science associate professor who will soon be taking his talents to Columbia University, has been named the winner of the 2013 ACM-Infosys Foundation Award in Computing Sciences.

  • Durbin warns Republicans standalone H-1B hike plan will fail

    A push by the high-tech industry to support a stand-alone H-1B increase is drawing the ire of U.S. Dick Durbin (D-Ill.).

  • US plan to end ICANN oversight could lead to 'Net censorship, lawmakers say

    A U.S. National Telecommunications and Information Administration plan to end its formal relationship with the Internet Corporation for Assigned Names and Numbers could open the door to Internet censorship by China, Russia or Iran, some U.S. lawmakers said.

  • How to respond to a data breach

    Data breaches seem to be happening at an absurdly rapid rate these days with reported incidents involving the theft of personally identifiable information hitting 25,566 in 2013 up from 10,481 in 2009.

  • Researchers publicly disclose vulnerabilities in Oracle Java Cloud Service

    Security researchers released technical details and proof-of-concept code for 30 security issues affecting Oracle's Java Cloud Service, some of which could allow attackers to compromise business-critical Java applications deployed on it.

  • FireEye, AhnLab score low in lab test of breach detection systems

    In an evaluative lab test, FireEye and Ahnlab each scored "below average" on their breach-detection systems (BDS) in a comparative group product test which was conducted by NSS Labs.

  • Apple patches Safari's Pwn2Own vulnerability, two-dozen other critical bugs

    Apple on Tuesday patched the security vulnerability in Safari that was successfully exploited at last month's Pwn2Own hacking contest, where a team cracked the browser to win $65,000.

  • Google asks US Supreme Court to review ruling on Wi-Fi packet sniffing

    Google has asked the U.S. Supreme Court to review a decision by an appeals court that its collection of data from unencrypted Wi-Fi networks is not exempt under federal wiretap laws.

  • NSA phone metadata collection program renewed for 90 days

    The Obama Administration has secured a 90-day extension of the National Security Agency's controversial authority to collect phone metadata records on U.S. customers under the Patriot Act.

  • US Navy to test humanoid robotic firefighters

    Some day, if there's a fire on a US naval ship, a humanoid robot may rush in to put it out.

  • NSA isn't evil, says noted civil libertarian

    Civil liberties and privacy groups have long criticized the U.S. National Security Agency, but those critics became louder last summer after details of the agency's data collection activities were disclosed in classified documents leaked by Edward Snowden.

  • Google trumpets extra encryption for Gmail, but stays mum on other apps

    Google recently trumpeted that it now encrypts Gmail messages while shuffling them among its data centers, an extra security layer aimed at thwarting government and criminal snoops, but didn't say if it applies this protection to its other applications.

  • Hacked passwords can enable remote unlocking, tracking of Tesla cars

    Tesla Motors accounts are protected only by simple passwords, making it easy for hackers to potentially track and unlock cars, according to a security researcher.

  • Mozilla steps up damage control as pressure for CEO Eich's ouster mounts

    Mozilla, the maker of Firefox, went into damage control mode over the weekend in response to criticism that its new CEO had donated to a California anti-gay marriage ballot proposition in 2008.

  • Dell unveils BYOD-focused mobility product plans

    Dell today unveiled enterprise mobility software for Google Android or Apple iOS that supports employee "bring your own device" use by selectively applying VPN controls only to the corporate apps on the device, not the employee's personal apps.

  • Mistake in ransomware program leaves decryption key accessible

    A malicious software program that encrypts a person's files until a ransom is paid has a crucial error: it leaves the decryption key on the victim's computer.

  • Banks withdraw claim against Target over break-in

    Two banks that took legal action against Target over its recent data breach have withdrawn their claims, apparently due to an erroneous allegation against a security vendor also named in the suit.

  • Some CIOs, IT managers unable to track advanced evasion techniques: survey

    There are 800 million known advanced evasion techniques (AETs) but some CIOs and security managers don’t have the methods to track AETs within their company, according to the results of a new study.

  • 1

    Google, Level 3 DNS services hijacked by TurkTelekom

    Google said its free DNS (Domain Name System) service is being intercepted by most Turkish ISPs as the country battles users trying to circumvent censorship efforts by the government.

Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia