International research just published claims to show that a growing number of organisations are having to invest heavily in IT systems in order to comply with data management requirements.
EFF launches web browser entropy tool
A new tool released by privacy advocacy group EFF is designed to help users find out how identifiable their web browsers are online.
Facebook users plagued by rogue application
Facebook was plagued by security and privacy issues both real and imagined in the last week, as a real-life worm battled with an imaginary one in a competition to see which could petrify the service’s users the most.
PricewaterhouseCoopers loses personal records of Alaska public employees
PricewaterhouseCoopers has lost the personal records of 77 000 former and current public employees of the state of Alaska, it emerged this week.
iPhone cracker repeats exploit on Playstation 3
George Hotz, the first iPhone cracker – and who reportedly spent more than 500 hours developing the first jailbreak application for the Apple’s iPhone back in 2007 – has apparently cracked the Sony Playstation 3.
Oil and gas companies hit hardest by cyberwarfare
The oil and gas sector has been the hardest hit by stealthy infiltration, according to a report from the Center for Strategic and International Studies (CSIS). The sector was hit by stealth attacks 17% more than the cross-sector average, with almost th…
PlainsCapital bank sues customer in liability over account security
A legal case filed by a bank against a customer in the US promises to test the liability of customers in the event of security breaches. Dallas, Texas-based PlainsCapital bank is suing a business customer, Hillary Machinery, for not taking adequate mea…
All is not OK in Oklahoma: State tax website victim of hack
The website of the Oklahoma Tax Commission was the apparent victim of a hack yesterday, one in which visitors to the website were prompted to accept an Adobe license agreement and download software. The hack could not come a worse time for the Commissi…
Security and malware threats to Mac and Apple products are on the rise
An annual report from security software provider Intego acknowledges it was a busy year for security threats to Apple devices, including the Mac OS X and iPhones. And while the Mac OS may be a less frequent target of malware authors, security threats t…
Many voice encryption systems are hackable says anonymous researcher
Many voice encryption products currently available are hackable through the use of a trojan being planted on the host PC, an IT security researcher has claimed.