Tags: behindRemove, fallsRemove

Spam falls after giant botnet takedowns 
By Tom Brewster | Nov 15, 2010 | Comment Now 
Law enforcement wins some battles.
 
Gartner: Android triumphs as iOS remains buoyant 
 
Hacker arrested on Mariposa botnet charges 
Jul 29, 2010 | Comment Now 
'Iserdo' picked up in Slovenia after co-ordinated international sting.
 
Organised crime behind 85 per cent of all data breaches 
By Dan Worth | Jul 28, 2010 | Comment Now 
Verizon Business report finds more data being lost than ever before.
 
Cutwail botnet authors behind wave of malicious IRS spam 
By Dan Kaplan | Sep 10, 2009 | Comment Now 
Malware-laden emails, at a rate of 90,000 an hour, are trying to dupe recipients into believing they were implicated in defrauding the IRS.
 
Authorities close in on South Korea hackers 
By Shaun Nichols | Jul 14, 2009 | Comment Now 
Researchers uncover command server in UK.
 
Vendors get behind encryption specification 
By Shaun Nichols | Feb 13, 2009 | Comment Now 
A group of hardware and security vendors including HP, IBM and RSA are putting their weight behind a new encryption key specification.
 
Gartner throws weight behind enterprise Web 2.0 
By Phil Muncaster | Aug 13, 2008 | Comment Now 
Analyst firm Gartner has urged firms to strongly consider Web 2.0, service-oriented architecture and cloud computing technology if they want to drive forward business transforma...
 
NHS falls victim to another data breach 
Jul 2, 2008 | Comment Now 
The NHS has had to admit to losing a laptop containing thousands of patient details.
 
Ethical hacking site falls victim to hackers 
By Richard Thurston | Jun 5, 2008 | Comment Now 
Metasploit, the hacking tools site which is widely used by white hat hackers, has itself fallen victim to ARP poisoning, which led to the defacement of the site
 
US school network falls victim to child hacker 
By Richard Thurston | May 27, 2008 | Comment Now 
Local authority races to upgrade its system security as the second teenager in five months breaches its network defences, copying 55,000 records
 
Firms being left behind by criminals 
By Gareth Morgan | Apr 11, 2008 | Comment Now 
Leading security technologists have warned that criminals' ability to innovate is threatening to outstrip firms' efforts to secure their enterprise.
 
Microsoft stands behind Yahoo bid 
By Shaun Nichols | Feb 13, 2008 | Comment Now 
Microsoft has responded to Yahoo's rejection of its buyout proposal insisting that the offer is "full and fair"..
 
Retailers lagging behind in security 
By Phil Muncaster | Feb 4, 2008 | Comment Now 
New Deloitte survey shows consumer businesses are still implementing PCI
 
UK lags behind in Firefox take-up 
By Iain Thomson | Jan 31, 2008 | Comment Now 
The UK has one of the lowest rates of Firefox take-up in Europe, according to figures from French analyst firm XiTi Monitor.
 
iPhone falls short of UK target 
Jan 22, 2008 | Comment Now 
The iPhone has failed to meet sales expectations in the UK, according to reports in The Financial Times.
 
Lotus to throw weight behind Apple 
By Martin Veitch | Jan 18, 2008 | Comment Now 
Apple’s hardware revival is prompting IBM to add support for the Mac and iPhone.
 
NZ man, brains behind global botnet 
Nov 30, 2007 | Comment Now 
The mastermind behind the 2006 DDoS attack on the Philadelphia University which infected 50,000 computers has been identified as an 18-year-old New Zealand man, nicknamed ‘AKILL’.
 
Email banter behind data explosion 
Nov 29, 2007 | Comment Now 
Companies are failing to identify the real culprit behind a lack of storage space and the huge volumes of data being hoarded, according to a new report..
 
China behind daily internet attacks on Germany 
By Matt Chapman | Oct 24, 2007 | Comment Now 
China is conducting almost daily spying attacks on businesses and government agencies in Germany, according to one of the country's intelligence officers..
1 2 3 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1043

Vote