- French Treasury accidentally signs SSL certificate for Google.com domains
- Data-stealing malware pretends to be Microsoft IIS server module
- Encrypted text messages may soon be on the way to some Android phones
- Google, Microsoft, others join in calling on NSA limits
- Russian-speaking group offers bulletproof hosting in Syria, Lebanon
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
Last week Gen. David Petraeus, the director of the Central Intelligence Agency, resigned in response to what has turned out to be a much bigger scandal than it first appeared.
Not long ago, the legal department at a financial services company in New York got a phone call from a hospital in London. The query: Why are you hacking us? With two known IP addresses, it wasn't difficult for the financial firm's information security staff to go back through the logs looking for traffic between the two organizations. And with the traffic identified, locating the computer from which the hacks were taking place didn't take long, either. The culprit: an individual who-as their human resources records soon confirmed-had formerly worked at that very hospital.
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, so does the need for an effective Enterprise Mobility Management (EMM) solution. Learn how to manage devices across multiple platforms all from a single, centralised and unified management console. Download for more!
Publisher's notes: SoftPerfect Network Protocol Analyzer is an advanced, professional tool for analyzing, debugging, maintaining and monitoring local networks and Internet connections. It captures the ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Acronis delivers backup and protection with Microsoft Active Directory
- Rate of innovation remains high in enterprise: Motorola
- Veeam Cloud Provider program growing more than 100 per cent YoY
- New virtual currency stymies Christmas traffic torrent
- Immense growth pushing datacentres to unsustainable point: Gartner
- Google Transit arrives in Queensland
- Taxi startup ingogo hails $3.4 million in latest funding round
- In Pictures: Microsoft's most monumental hits, misses, and moments of 2013
- In Pictures: 11 holiday gift ideas for IT executives
- In Pictures: The Mother of All Demos - The 1968 presentation that sparked a tech revolution
- B2B customers are increasingly led by consumer habits and experience
- CMO interview: Marketing the wool off a sheep’s back
- Mobile browser usage share hits 20% for the first time
- Apple knows where shoppers are in its stores with nationwide iBeacon rollout
- Should Facebook, Yahoo and Twitter really judge what's news?