Biometrics move from banking to borders
Biometrics has changed in several significant ways over the last decade, according to a prominent expert in the field.
More results...
Biometrics has changed in several significant ways over the last decade, according to a prominent expert in the field.
Users of IT security products should see no gaps in service resulting from floods in Britain, despite the location of several vendors in some of the worst-affected towns.
Google is buying its way into the infosecurity market, through purchasing security service provider Postini for $625 million (£310m, EUR458m) in cash, it said on 9 July.
This year, the Victory Challenge team introduced security into their game plan as they challenged the Swiss defender Alinghi, in the 32nd America’s Cup.
Eighty per cent of infected websites have been compromised by a third-party hacker, according to the latest threat statistics from Sophos.
Lloyds TSB has purchased pattern-recognition software from US vendor Actimize for detecting employee fraud within its retail banking operation. Use of such software is already common in financial services for spotting fraud in external transactions, su…
One gang is responsible for more than half of all attempted phishing for the likes of online banking log-in details, and has found ways to extend the lives of its web-sites, according to researchers at Cambridge University.
Systems Affected
This vulnerability affects the following
Microsoft Windows operating systems by default:
Microsoft Windows XP and Microsoft Windows XP Service Pack 1
Microsoft Windows XP 64-Bit Edition Service Pack 1
Microsoft Windows XP 64-Bit …
Systems Affected
Applications that process JPEG images on Microsoft Windows, including
but not limited to
Internet Explorer
Microsoft Office
Microsoft Visual Studio
Picture It!
Applications from other vendors besides Microsoft
Overview
An a…
Systems Affected
MIT Kerberos 5 versions prior to krb5-1.3.5
Applications that use versions of MIT Kerberos 5 libraries prior to krb5-1.3.5
Applications that contain code derived from MIT Kerberos 5
Updated vendor information is available in the s…