Spy-approved secure version of Android released
The US National Security Agency (NSA) has released a secure version of Google’s Android platform, dubbed secure enhanced (SE) Android, which is based on an application-level permissions model.
More results...
The US National Security Agency (NSA) has released a secure version of Google’s Android platform, dubbed secure enhanced (SE) Android, which is based on an application-level permissions model.
Andrew Crossley was the solicitor behind the ACS:Law scandal. His firm sent out some 20,000 speculative letters to ‘illegal file sharers’ demanding payment of £500 in reparation to his rightsholder clients (in this case MediaCAT, which represented the …
Recent months have seen the arrival of a new type of ransomware based on a legal threat from supposed law enforcement agencies.
A secret file said to contain security plans for the London Olympics was apparently left on a London train by a policeman.
This is the conclusion of a joint study by Opus and ValidSoft, a company that specializes in telecommunications-based authentication and transaction verification for financial services and government organizations.
The breach of the database containing details of 24 million customers of Amazon-owned online shoe retailer Zappos has once again raised fears over the security of e-commerce.
It is ten years since Bill Gates distributed his internal ‘Trustworthy computing’ memo to Microsoft staff: “We must lead the industry to a whole new level of Trustworthiness in computing.” Has Microsoft delivered?
The move to high-speed 4G mobile networks poses challenges for carriers and vendors to deploy security products that can handle those high speeds and data volumes, a challenge that the European Advanced Networking Test Center (EANTC) recently put to th…
Zappos, an online shoe and clothing retailer, is warning 24 million customers that a security breach has exposed their personal information, including partial credit card data.
Key to a compelling and instructive detective story is the sort of security failing usually exploited by the cybercriminals, but in this instance harnessed by Sophos.