It seems that the pervasively popular nature of social networking sites like Facebook and Twitter are not all they might seem, as a security researcher has revealed how easy – and cheap – it is to use third party companies to gain large followings on t…
iPhones and Galaxy Tabs banned from Saudi security establishments
The Saudi Ministry of the Interior has banned the use of certain high-definition camera-equipped smartphones and tablets from its security establishments, arguing that the devices are easy to hack and be remotely subverted.
Hackers infiltrate German police and customs service computers
Hackers were able to infiltrate computers at the German federal police and customs service and remain there for months without being detected, according to a German newspaper.
UK counter-terror report confirms extremists are early adopters of technology
The latest report on the UK’s Counter Terror strategy says that extremist groups such as al-Qaeda are early adopters of technology in their bid to wage war on governments and their citizens.
PCI DSS broadens appeal beyond credit card data security
The PCI Data Security Standard (DSS), originally developed to protect credit card data, can be used to vet cloud providers for data security practices, as well as provide a template for compliance with information security laws, noted Sean Bruton, seni…
EU seeks public comment on personal data breach notification rules
The European Commission has opened a public consultation on expanding, standardizing, and clarifying personal data breach notification requirements for European businesses.
Signify moves 2FA onto Android smartphones and tablets
Signify has enabled its software token two-factor authentication (2FA) service as an Android app, making the company one of the first to extend 2FA to the Google smartphone platform. The Android app joins similar apps available for the BlackBerry, iPho…
Signify moves 2FA onto Android smartphones and tablets
Signify has enabled its software token two-factor authentication (2FA) service as an Android app, making the company one of the first to extend 2FA to the Google smartphone platform. The Android app joins similar apps available for the BlackBerry, iPho…
Symantec researcher warns on Apple MobileMe/iDisk phish
A Symantec researcher is reporting a large phish taking place surrounding Apple’s new iDisk cloud service, with recipients being routed to a rogue MobileMe/iDisk login page – located on a free web hosting service – in a bid to extract their login crede…
Avast claims 60% of Adobe Reader users are running vulnerable versions of their software
Research carried out by Avast has revealed that 60% of users of Adobe Reader are using an outdated and vulnerable version of the popular Adobe application.