The internal security risk issue is fast becoming a boardroom topic in most organizations, especially now that relatively rare road warriors have given way to a truly mobile workforce, able to work from almost anywhere, in most businesses.
Conservative party outlines plans on cybersecurity
The Conservative party has published a green paper which, amongst other items of national security, seeks to create a center to deal with cyberattacks against the UK.
Time Inc employee fired over customer credit card issue
Time Inc has written to customers and the New Hampshire Attorney General’s office, warning of a potential security breach following the possible misuse of customer credit card information by an employee.
Blackhats and whitehats react to Haiti tragedy
Blackhats and whitehats reacted with typical polarity to the disastrous Haiti earthquake this week. One faction unleashed a torrent of malware capitalizing on the tragedy, while the other organized a series of ‘hackathons’ to help develop technologies …
Online criminals looking to profit from Haiti earthquake
Proving that there is no situation too tragic to exploit, cyber scofflaws have been quick to capitalize on the world’s interest in the recent earthquake in Haiti. With so many people looking to reach out and donate to victims of the tragedy, one group …
Google – China attack episode: Is Microsoft to blame?
A complex attack on the Google Gmail accounts of human rights activitists – apparently from hackers based in China – has now been indirectly blamed on Microsoft, after McAfee Labs announced last night that the attacks appear to exploit a little-known v…
Employees increasingly found to be downloading illegal files
As if companies have not had enough IT security headaches already, it seems that a growing number of firms have problems with their staff illegally downloading copyrighted files whilst at work.
DARPA enters second leg of cybersecurity testing project
The Defense Advanced Research Projects Agency, or DARPA, has awarded $55.5m in contracts to bolster a secretive cybersecurity monitoring system, it was announced this week.
Internet Explorer vulnerability used in Google attack
More details are emerging concerning the concerted attacks on over 20 technology companies, including Google, that were revealed earlier this week. The attackers targeted a vulnerability in Internet Explorer, according to Microsoft. It is now investiga…
Unprotected enterprise end point rising, despite security scares
A study into remote working carried out by Check Point Software Technologies has found that, despite a significant rise in the numbers of remote workers, only 27% of organisations use encryption to protect their corporate data.