Employee security awareness, firewalls, data leakage protection, and collaboration are all key components of a healthy information security ecosystem, according to a panel at the MIT Sloan CIO Symposium held Wednesday.
VMware? There’s an iPhone app for that
VMware has released an iPhone app designed to manage identities across both cloud and virtual server environments. Known as the Horizon App Manager, the iOS app is one of the first results of Project Horizon, which VMware announced last summer.
Peak IP traffic in Europe dominated by P2P and streaming content
The Q1 internet phenomena report from Sandvine claims to show that there is a growing appetite for on-demand applications that will continue to drive data consumption and network quality requirements.
Survey finds digital distraction in the workplace costs billions
Research just published claims to show that digital distraction is a very real problem in the workplace, with 45% of workers only working 15 minutes or less before getting interrupted.
Massachusetts labor agency admits to data breach that could affect 210,000 citizens
The Massachusetts Executive Office of Labor and Workforce Development has admitted belatedly that personal information on up to 210,000 unemployed residents may have been compromised as the result of a cyberattack.
Security researcher warns on remote administration tools (RATs)
Security researcher Brian Krebs is reporting that malware-installed remote administration tools (RATs) are starting to arrive in the cybercriminal threats arena.
Average cost of data breach for Australian firms reached $2 million
The average cost of a data breach for Australian companies was $2 million in 2010, according to a survey conducted by the Ponemon Institute on behalf of Symantec’s Australia unit.
Context says Khronos fix to WebGL flaw is insufficient
Context Information Security, which identified a flaw in the new WebGL 3D graphics standards that exposes Firefox and Chrome browsers to hackers, said that a fix proposed by vendor Khronos Group does not address the wider security issue.
FBI sucks in complete internet pipes in latest surveillance evolution.
It looks as though the FBI is quietly canning its long-standing Carnivore methodology of scanning internet users’ sessions, and, where it is difficult to isolate a users’ actual IP session, simply replicating and recording the entire IP data pipe.
Security researcher warns over Google Doodle scareware infection
A German security researcher has warned on a new hacker methodology of infecting users by presenting poisoned web search results as a primary hit after they click on a Google Doodle.