Security

spacer Security also in this channel
  • News
  • In Depth
  • How-Tos
  • Slideshows

Security Newsletter

Latest News

spacer

Adobe confirms Connectusers.com forum hack and shuts down website

Adobe has shut down Connectusers.com, a community forum site for users of its Adobe Connect Web conferencing platform, because the site's user database was compromised. read more »

Cloud security outages are bigger risk than breaches, says Gartner

Security remains a chief inhibitor to enterprise adoption of cloud computing resources and one Gartner analyst says the biggest concern should not be that data could be compromised in the cloud, but rather that there may be a cloud outage that could lead to data loss. read more »

Skype disables password resets follow account hijacking flaw leak

Skype has disabled the account password reset option on its website following reports that the feature can be abused to hijack Skype accounts if the attackers know the email addresses associated with them. read more »

New UAE cyberlaw clamps down on political dissent, pornography, gambling

A new cyberlaw issued by the President of the United Arab Emirates this week provides for the imprisonment of political dissidents, according to information on the law from the government-run Emirates News Agency, also known as WAM (Wakalat Anba'a al-Emarat). read more »

Adobe investigating alleged customer data breach

Adobe said this morning it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database. read more »

more news ..
Advertisement
spacer
What people are saying about...

Windows 8spacer Everything you want to know about Microsoft's windows 8 OS t.co/0C6ggpit #Windows #windows_8

spacer #Windows 8 start up in 10 seconds

spacer RT @richardhicks: #Windows 8 Modern UI apps and #Forefront #TMG t.co/yZ2SwCN9 #win8

spacer RT @MSFTnews: VIDEO: Behind the Scenes of Fresh Paint on @Windows 8 t.co/3KDiUnqv Free app in the #Windows Store, get your creati ...


spacer

From Wow to How : Making mobile and cloud work for you

Join this exclusive Biztech Briefing and learn how to effectively deliver mobile work styles and cloud services together.


Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


spacer

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


spacer

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

How your company can avoid cyber espionage attacks

Malware continues to change at a rapid pace, as evidenced by new types of high-tech, military-grade malicious code grabbing headlines such as Stuxnet, Duqu and Flame. read more »

Innovate or die, says former Zynga CSO Nils Puhlmann

Managing Zynga's converged security department was a challenging job that Puhlmann says has left him ready for a break. But don't expect him to be relaxing for too long. Puhlmann is also the co-founder of the Cloud Security Alliance (CSA), a community of over 33,000 security professionals worldwide that promotes the use of best practices for security in cloud computing. His work with CSA continues to evolve. read more »

Embedded security no excuse for employee irresponsibility

Security is no longer a function that can be restricted to just one group within the organisation. Up to now, the IT department has been afforded the luxury of seeing themselves as the guardians of corporate data, shielding the innocent employees of the organisation, behind the scenes and without their knowledge. read more »

Six tips for mobile device management security

There has been a lot of discussion this year about the increasing influx of consumer devices being used for both professional and personal purposes. Many organisations are feeling a little overwhelmed as they try to work out appropriate security levels and device management boundaries. When you take into consideration all the platform and application updates chewing through corporate bandwidth, plus the potential for rogue applications and malware to gain illicit access to company data, there are many headaches for security managers to deal with. read more »

Internet Explorer zero-day attacks - What you need to know

Microsoft has confirmed reports that a zero-day vulnerability in its Internet Explorer browser is being actively attacked in the wild. While Microsoft works diligently to crank out a patch, it's important for businesses and consumers to understand the threat, and the steps that can be taken to avoid compromise while you wait. read more »

more in depth ..
Editor's Pick

Dutch government to let law enforcement hack foreign computers

Embedded security no excuse for employee irresponsibility

HSBC restores websites after major DDoS assault

Kaspersky developing secure OS for industrial control

Most Popular in Security

RIM releases security update for Blackberry Enterprise Server

A vulnerability could have allowed hackers to access BES infrastructure and cause DoS attacks

The most dangerous botnets of 2012

With the help of security firm Kindsight, join us as we review the top ten worst botnets this year

EU data protection regulation and cookie law - Are you ready?

Big changes are coming with the European Union's E-Privacy Directive

Microsoft patches critical flaws in Windows 8, Windows RT

Part of a 19-bug update that addresses vulnerabilities in Windows, IE9, Excel and .Net

How your company can avoid cyber espionage attacks

To properly protect your company against attacks, it's imperative that you take precautions

How to hack an iPad

Prevent access with a four-digit PIN code or beware - your device can be hacked!

Crime and malware: A short history of computer fraud

Who's keeping tabs on you?

Security threat data advisory tools

Check out these browser-based tools to keep up on the latest cybersecurity threats

White Papers

The latest tactics and potential business impacts 2012

Fraud alert: phishing read more »

A collaborative approach to compliance

4 pillars of collaborative compliance read more »

more white papers ..
Blogs

Risk management & business technology resiliency - What's changed since 2009

Take a second to think back to the year 2009. The US was in the thick of the financial crisis; companies were slashing budgets, and the unemployment rate was in double-digits. And do you remember a little thing called the...read more »

Hurricane Sandy shows a dramatic improvement from botched Katrina response

My house sits atop a hill overlooking the Atlantic Ocean (hence, the neighborhood name of “Beachmont”) and was built sometime in 1890. It’s one of the tallest houses in the neighbourhood and as I write this post, my house is swaying...read more »

more blogs ..
Advertisement
spacer

Slideshows: The most dangerous botnets of 2012

Also in slideshows :

  • Security threat data advisory tools
  • 13 IT security myths
  • 10 security industry All-Stars
more slideshows ..
ComputerworldUK Poll

Will you be buying the iPhone 5?






Solution Centres

spacer

Business IT Hub

View the latest exclusive content, including interactive video, opinion and whitepapers Read more...


spacer

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


spacer

Accelerate Your IT Efficiency

View the latest capacity management resources including white papers, videos and news.


Advertisement
spacer

Apple warranty practices now focus of EU-wide probe

IT Business >>
spacer

Regulator to target online retailers using personalised pricing tricks

Applications >>
spacer

Adobe confirms Connectusers.com forum hack and shuts down website

Security >>
spacer

Global manufacturer ditches underperforming IBM in favour of IaaS provider

Cloud Computing >>
spacer

Dundee picked to support worldwide web infrastructure

Infrastructure >>
spacer

Windows 8 chief Steven Sinofsky leaves Microsoft - What happened?

Operating Systems >>
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.