A number of VA facilities have violated the Department of Veterans Affairs (VA) prohibition on using online tools to share patients’ information among facilities.
$4.99 256-bit encrypted VOIP application arrives on the iPhone
Although military-grade encrypted VOIP software for the iPhone has been around for while, the highly specialised software has been quite expensive, typically running into three figures. Now a Florida-based firm has released a 256-bit encrypt VOIP app f…
FTC clears $7.7bn Intel acquisition of McAfee
The Federal Trade Commission (FTC) has approved Intel’s $7.7bn acquisition of security software giant, McAfee.
BitTorrent links with BitDefender for integrated IT app security
IT security software vendor BitDefender has linked up with peer-to-peer data development company BitTorrent – which developed the file-sharing protocol of the same name – to offer the 80 million estimated users of the protocol an integrated malware det…
Inadvertent data disclosure by employees poses growing risk
Inadvertent disclose of sensitive information by well-meaning workers will pose the greatest information security threat to organizations in the coming year, according to Frank Kenney, vice president of global strategy at Ipswitch.
Google says sorry, deletes all UK Street View WiFi data
Google has deleted all UK payload data collected by its Street View cars from unsecured British WiFi networks, the company has confirmed.
DARPA develops technology to prevent surprise cyberattacks
The Defense Advanced Research Projects Agency (DARPA) is undertaking a number of cybersecurity research and development projects for the Department of Defense designed to prevent surprise cyberattacks.
Bredolab botnet revealed by Kaspersky Lab analyst
Kaspersky Lab’s malware analyst Alexei Kadiev has posted an interesting analysis on how the Bredolab botnet – which infected around 30 million PCs at its height – functioned.
Symantec researcher spots C&C botnet toolkit in the wild
Security researchers from Symantec claim to have spotted a new crimeware toolkit being sold in the underground marketplace. The toolkit – known as Dream Loader – generates a trojan that is exclusively used to distribute malware.
Hotmail tries to plug phishing with Active Views
Hotmail is claiming it can now tackle its biggest security issues with a way to send and receive active e-mail messages.