- Care.data pilots to begin at up to 500 GP surgeries in the autumn
- Lloyds employees accused of £2m computer fraud
- Activism's slippery slope: Anonymous targets children's hospital
- New iPad rumor rollup for week ending April 23
- Apple users put at risk by 3-week delay between OS X and iOS patches, researchers say
- Should Australians prepare for rubber-hose cryptanalysis?
- Data retention: Just like diamonds, metadata is forever
- UPDATED: 4G in Australia: The state of the nation
- Google will push mobile app installs in search and YouTube
- Sorting the security standards
Rooting your Android phone and flashing it with a new ROM -- a different version of the OS -- is usually accompanied by dire warnings from the manufacturer and occasionally even the supplier of the ROM image that it can make your phone less secure. Nov'IT, exhibiting at Mobile World Congress this week, says that its ROM will help keep your data and communications safe from prying eyes.
Security researchers managed to bypass the protections offered by Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a utility designed to detect and block software exploits, and concluded that the tool would not be effective against determined attackers.
As anticipated, the latest round of Microsoft's Patch Tuesday monthly release of security fixes addresses a widely known Internet Explorer (IE) vulnerability already being exploited by malicious hackers.
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT systems.
Cisco Systems released a security patch for its Unified Communications Manager (Unified CM) enterprise telephony product in order to mitigate an attack that could allow hackers to take full control of the systems. The company also patched denial-of-service vulnerabilities in its Intrusion Prevention System software.
This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.