Chinese hackers have scored two high-profile cyber-heists, according to reports: they have gained access to designs of more than two dozen major US weapons systems, while also stealing the blueprints for Australia’s new spy headquarters.
Facebook Fan Page phishing scam aims to hijack accounts
A fresh phishing scam looking to capitalize on the popularity of Facebook Fan Pages has thrown a lure in using a security warning.
Is the Xbox One a Covert Surveillance Device?
When details about Microsoft’s new games console, the Xbox One, first began to emerge, privacy campaigners were immediately concerned: is the Xbox One an intrusive but covert surveillance device?
Sky Apps hacked – but not the apps themselves
Sky’s Android users may have woken on Sunday morning to headlines screaming ‘Sky UK Apps Compromised on Play Store, Uninstall Them!’ But don’t be too hasty.
Man made redundant fined for stealing sensitive information
When he learned that he was being made redundant from his position as Community Health Promotions Manager at a council-run leisure center, he emailed sensitive medical information on 2471 people to himself to help establish his own new company.
Experian tackles social media risk
Global financial information company and credit score keeper Experian has implemented new security controls to drive cyber-risk out of its social media activities, in an effort to safeguard consumer information.
Microsoft Stops Predicting AV Samples to Focus on Ecosystem
The Microsoft Malware Protection center is shifting its research focus away from predicting test samples and instead focussing on prevalence-weighted response and family research.
DDoS and the challenge of civil disobedience on the internet
Starting with the Anonymous Operation Payback in 2010, in retaliation for what many consider the illegal financial blockade of WikiLeaks, DDoS as a weapon of dissent has increasingly become a part of life on the internet.
Education Institutions at Forefront of BYOD
BYOD as a security issue has largely focused on the business arena – the dangers inherent in allowing personal smartphones and tablets to connect to the corporate network. But mobile devices have been adopted as a way of life with youngsters, and in so…
Blue Coat Systems to acquire Solera Networks
Blue Coat operates largely outside of the perimeter; Solera Networks operates within the perimeter. Put the two together and you have the complete security solution – that is the the theory behind Blue Coat’s latest acquisition.