are

Amazon confirms cloud services are back

Amazon confirms cloud services are back

The tech giant says its cloud services are back to normal, but a small amount of data will never be retrieved.
Paul Briden Apr 29 2011 12:12PM Security
1 in 8 malware attacks come from USB device

1 in 8 malware attacks come from USB device

AutoRun is the key attack point.
SC Australia Staff Nov 5 2010 1:24PM Security
Sites ending in '.com' and '.vn' are the riskiest

Sites ending in '.com' and '.vn' are the riskiest

Vietnam has riskiest national domain.
Dan Kaplan Nov 1 2010 11:21AM Security
Security firm warns of advanced evasion techniques

Security firm warns of advanced evasion techniques

Many may ignore threat.
Dan Raywood Oct 21 2010 2:13PM Security
World Cup fans hit by fraud scare

World Cup fans hit by fraud scare

Stolen personal details allegedly sold online.
Dan Raywood Sep 15 2010 2:31PM Security
Security software market expected to grow by 11% in 2010

Security software market expected to grow by 11% in 2010

Driven by identity management and compliance.
Dan Raywood Aug 18 2010 1:23PM Security
Microsoft classifies Win32k.sys vulnerability as a low grade threat

Microsoft classifies Win32k.sys vulnerability as a low grade threat

No plans for an out-of-band patch.
Dan Raywood Aug 16 2010 1:44PM Security
Antivirus programs only detect 18% of zero-day malware

Antivirus programs only detect 18% of zero-day malware

Malware writers still ahead of the game.
Dan Raywood Aug 11 2010 2:06PM Security
Twitter and Google riddled with malicious links

Twitter and Google riddled with malicious links

Only 29 per cent of Twitter members are 'true' Tweeters.
SC Australia Staff Jul 29 2010 1:09PM Security
How can you be confident when the endgame stakes are increasing?

How can you be confident when the endgame stakes are increasing?

IT personnel need to take more of an integrated approach.
Devin Anderson, product line manager for Security Suite, Jun 28 2010 11:21AM Security
Branch office security: What are the real problems?

Branch office security: What are the real problems?

Organisations need not overlook security at their satellite office locations.
Gert Hansen, vice president of product management, Ast Jun 15 2010 10:36AM Security
Facebook hit by new clickjacking attack

Facebook hit by new clickjacking attack

Uses 'like' function.
Dan Raywood Jun 2 2010 12:50PM Security
Thousands of websites infected with 'backdoor code': Websense

Thousands of websites infected with 'backdoor code': Websense

Threats changing hourly.
Dan Raywood May 5 2010 11:33AM Security
BitDefender apologises for faulty update

BitDefender apologises for faulty update

False positive problem.
Dan Raywood Mar 23 2010 12:28PM Security
RSA 2010: Encryption and anti-virus are failing, warn experts

RSA 2010: Encryption and anti-virus are failing, warn experts

Traditional approaches growing increasingly useless.
Iain Thomson Mar 3 2010 2:22PM Security
Opinion: Smaller firms are coming into fashion

Opinion: Smaller firms are coming into fashion

Niche IT suppliers do more for less.
Martin Butler Aug 13 2009 6:43AM Strategy
Internet snooping laws are "overly intrusive"

Internet snooping laws are "overly intrusive"

London School of Economics report says new laws will treat every electronic communication as suspicious.
Tom Young Jun 18 2009 7:01AM Telco/ISP
Hackers use spoofed WiFi access points to steal credentials as Switch Cascade introduced

Hackers use spoofed WiFi access points to steal credentials as Switch Cascade introduced

Spoof WiFi access points may cause a problem for users of wireless technology.
Dan Raywood May 22 2009 9:14AM Security
Opinion: Why national Internet filters are pointless

Opinion: Why national Internet filters are pointless

It seems that the world plus dog is falling over itself to filter the World Wide Web in a desperate bid to protect children from things they can handle on their own.
Nick Farrell Jan 22 2009 6:26AM Telco/ISP
Mobile phones are vulnerable to botnets

Mobile phones are vulnerable to botnets

Security researchers at Georgia Tech have determined that mobile phones are vulnerable to hacking attacks.
Aharon Etengoff Oct 16 2008 6:48AM Security

Log In

  |  Forgot your password?