Tags: firmsRemove, fromRemove

EU lawmakers seek to limit use of data by Internet firms 
By Claire Davenport | Jan 10, 2013 | Comment Now 
Firms fear chilling effects on growth.
 
Tech firms make best workplaces 
Jun 21, 2012 | Comment Now 
Annual list dominated.
 
The fallout from the Epsilon breach 
By Tom Brewster | Apr 7, 2011 | Comment Now 
The Epsilon breach took place late last month, but the ramifications could be serious. Tom Brewster looks at what the consequences could be...
 
Pipe Networks seeks exemption from cherry-pick rules 
By Ry Crozier | Mar 1, 2011 | Comment Now 
Questions why LTE operators would be exempt.
 
Energy firms unprepared for cyber attacks 
By Tom Brewster | Feb 24, 2011 | Comment Now 
Energy providers recognise the threats they face, but some are not responding with the tech to protect themselves, data shows.
 
Fixes for two Windows flaws coming from Microsoft 
 
Xenophon emerges from Gillard NBN meeting 
By Ry Crozier | Nov 23, 2010 | Comment Now 
Working 19-hour days to cut through "mess".
 
Microsoft preps three patches for Tuesday 
By Dan Kaplan | Nov 5, 2010 | Comment Now 
Office and Unified Access Gateway to see fixes.
 
Avalanche botnet moves from distributing spam to Zeus lures 
 
Security needs to move from physical to virtual: VMware 
By Jennifer Scott | Oct 13, 2010 | Comment Now 
With more applications virtualised than ever before security needs to follow suit.
 
New Reader, Acrobat from Adobe fixed for 23 flaws 
By Dan Kaplan | Oct 6, 2010 | Comment Now 
Adobe closes a whopping 23 vulnerabilities in new release.
 
TaintDroid reveals security threat from app downloads 
By Eric Doyle | Oct 4, 2010 | Comment Now 
Android free apps display some inappropriate behaviour.
 
Twitter to switch from basic access authentication to OAuth on its API 
 
Black Hat 2010: IE6 and IE7 also suffer from auto-fill flaw 
 
Security budgets stable or increasing at financial firms 
By Angela Moscaritolo | Jun 21, 2010 | Comment Now 
Compliance and insider threats drive growth.
 
McKinnon lawyers seek help from new UK home secretary 
By Dan Kaplan | May 18, 2010 | Comment Now 
Change of government could bring change in fortune.
 
US$51bn losses from software piracy contribute to malware 
By Angela Moscaritolo | May 14, 2010 | Comment Now 
Four out of ten software packages installed last year were pirated.
 
Analysis: Google drops the http:// from Chrome 
 
Google's Chinese partners request urgent clarification 
By Dan Worth | Mar 18, 2010 | Comment Now 
But is the open letter real?
 
Virtualised servers face security questions 
Mar 17, 2010 | Comment Now 
Rush to replace physical servers could leave firms vulnerable.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1014

Vote