Security
Security also in this channelSecurity Newsletter
Latest News
Adobe confirms Connectusers.com forum hack and shuts down website
Adobe has shut down Connectusers.com, a community forum site for users of its Adobe Connect Web conferencing platform, because the site's user database was compromised. read more »
Cloud security outages are bigger risk than breaches, says Gartner
Security remains a chief inhibitor to enterprise adoption of cloud computing resources and one Gartner analyst says the biggest concern should not be that data could be compromised in the cloud, but rather that there may be a cloud outage that could lead to data loss. read more »
Skype disables password resets follow account hijacking flaw leak
Skype has disabled the account password reset option on its website following reports that the feature can be abused to hijack Skype accounts if the attackers know the email addresses associated with them. read more »
New UAE cyberlaw clamps down on political dissent, pornography, gambling
A new cyberlaw issued by the President of the United Arab Emirates this week provides for the imprisonment of political dissidents, according to information on the law from the government-run Emirates News Agency, also known as WAM (Wakalat Anba'a al-Emarat). read more »
Adobe investigating alleged customer data breach
Adobe said this morning it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database. read more »
more news ..What people are saying about...
Windows 8 Everything you want to know about Microsoft's windows 8 OS t.co/0C6ggpit #Windows #windows_8
#Windows 8 start up in 10 seconds
RT @richardhicks: #Windows 8 Modern UI apps and #Forefront #TMG t.co/yZ2SwCN9 #win8
RT @MSFTnews: VIDEO: Behind the Scenes of Fresh Paint on @Windows 8 t.co/3KDiUnqv Free app in the #Windows Store, get your creati ...
Follow us
From Wow to How : Making mobile and cloud work for you
Join this exclusive Biztech Briefing and learn how to effectively deliver mobile work styles and cloud services together.
Google Nexus series
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Accelerate Your IT Efficiency
View the latest capacity management resources including white papers, videos and news.
Windows 8
Check out our latest articles on Microsoft's next-generation operating system.
In Depth
How your company can avoid cyber espionage attacks
Malware continues to change at a rapid pace, as evidenced by new types of high-tech, military-grade malicious code grabbing headlines such as Stuxnet, Duqu and Flame. read more »
Innovate or die, says former Zynga CSO Nils Puhlmann
Managing Zynga's converged security department was a challenging job that Puhlmann says has left him ready for a break. But don't expect him to be relaxing for too long. Puhlmann is also the co-founder of the Cloud Security Alliance (CSA), a community of over 33,000 security professionals worldwide that promotes the use of best practices for security in cloud computing. His work with CSA continues to evolve. read more »
Embedded security no excuse for employee irresponsibility
Security is no longer a function that can be restricted to just one group within the organisation. Up to now, the IT department has been afforded the luxury of seeing themselves as the guardians of corporate data, shielding the innocent employees of the organisation, behind the scenes and without their knowledge. read more »
Six tips for mobile device management security
There has been a lot of discussion this year about the increasing influx of consumer devices being used for both professional and personal purposes. Many organisations are feeling a little overwhelmed as they try to work out appropriate security levels and device management boundaries. When you take into consideration all the platform and application updates chewing through corporate bandwidth, plus the potential for rogue applications and malware to gain illicit access to company data, there are many headaches for security managers to deal with. read more »
Internet Explorer zero-day attacks - What you need to know
Microsoft has confirmed reports that a zero-day vulnerability in its Internet Explorer browser is being actively attacked in the wild. While Microsoft works diligently to crank out a patch, it's important for businesses and consumers to understand the threat, and the steps that can be taken to avoid compromise while you wait. read more »
more in depth ..Editor's Pick
Dutch government to let law enforcement hack foreign computers
Embedded security no excuse for employee irresponsibility
HSBC restores websites after major DDoS assault
Kaspersky developing secure OS for industrial control
Most Popular in Security
RIM releases security update for Blackberry Enterprise Server
A vulnerability could have allowed hackers to access BES infrastructure and cause DoS attacks
The most dangerous botnets of 2012
With the help of security firm Kindsight, join us as we review the top ten worst botnets this year
EU data protection regulation and cookie law - Are you ready?
Big changes are coming with the European Union's E-Privacy Directive
Microsoft patches critical flaws in Windows 8, Windows RT
Part of a 19-bug update that addresses vulnerabilities in Windows, IE9, Excel and .Net
How your company can avoid cyber espionage attacks
To properly protect your company against attacks, it's imperative that you take precautions
How to hack an iPad
Prevent access with a four-digit PIN code or beware - your device can be hacked!
Crime and malware: A short history of computer fraud
Who's keeping tabs on you?
Security threat data advisory tools
Check out these browser-based tools to keep up on the latest cybersecurity threats
White Papers
The latest tactics and potential business impacts 2012
Fraud alert: phishing read more »
A collaborative approach to compliance
4 pillars of collaborative compliance read more »
more white papers ..Blogs
Risk management & business technology resiliency - What's changed since 2009
Take a second to think back to the year 2009. The US was in the thick of the financial crisis; companies were slashing budgets, and the unemployment rate was in double-digits. And do you remember a little thing called the...read more »
Hurricane Sandy shows a dramatic improvement from botched Katrina response
My house sits atop a hill overlooking the Atlantic Ocean (hence, the neighborhood name of “Beachmont”) and was built sometime in 1890. It’s one of the tallest houses in the neighbourhood and as I write this post, my house is swaying...read more »
more blogs ..Slideshows: The most dangerous botnets of 2012
Also in slideshows :
- Security threat data advisory tools
- 13 IT security myths
- 10 security industry All-Stars
ComputerworldUK Poll
Will you be buying the iPhone 5?
View poll results »
Solution Centres
Business IT Hub
View the latest exclusive content, including interactive video, opinion and whitepapers Read more...
HP Data Protection Zone
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
Accelerate Your IT Efficiency
View the latest capacity management resources including white papers, videos and news.