nightmare?

BitDefender apologises for faulty update

BitDefender apologises for faulty update

False positive problem.
Dan Raywood Mar 23 2010 12:28PM Security
Facebook app changes could lead to security issues

Facebook app changes could lead to security issues

Email harvesting may attract attacks.
Dan Raywood Jan 25 2010 11:48AM Security
Report finds most data breaches are 'utterly preventable'

Report finds most data breaches are 'utterly preventable'

SQL injection attacks still a major headache.
Munir Kotadia Dec 9 2009 4:00PM Security
Apple's iPhone a security nightmare for enterprises

Apple's iPhone a security nightmare for enterprises

When Apple's iPhone hits the streets this week, two things are likely: It'll be widely successful - as Apple's other consumer products have been - and it'll pose unknown risks to enterprise networks wherever it shows up.
Jim Carr Jun 27 2007 7:18AM Security
Mozilla nightmare continues as site hit by hackers

Mozilla nightmare continues as site hit by hackers

Not-for-profit software group Mozilla has been hit by hackers downloading infected source code onto its website.
David Quainton Sep 21 2005 10:59AM Security
Mobile workforce - security nightmare or opportunity?

Mobile workforce - security nightmare or opportunity?

Over the last decade blackberries, mobile phones, laptops, PDAs and a variety of other devices have become intrinsic to both our working and personal lives. It is impossible to imagine a life without them. Consumers and businesses alike have seen the advantages of real time communication and have embraced the technology that allows them to do more whilst on the move.
Dave Taylor Aug 3 2005 12:02PM Security
Company porn creates regulatory nightmare

Company porn creates regulatory nightmare

IT directors are putting businesses at financial risk by not enforcing regulation linked to porn prevention in the workplace.
David Quainton Jul 19 2005 11:37AM Security
USBs create security nightmare

USBs create security nightmare

USB flash drives and media players are creating huge security holes for businesses, a new study has revealed.
David Quainton Jun 14 2005 2:36PM Security
3G dream a security nightmare

3G dream a security nightmare

Smart mobile technology is rapidly gaining in popularity – and hackers and crackers are among its biggest fans! Very few consumers know about the vulnerabilities of 3G technology, and only now is the industry waking up to the potential security nightmare.
Hamid Jahankhani May 11 2005 2:07PM Security
Choicepoint cuts data sales after security nightmare

Choicepoint cuts data sales after security nightmare

Consumer data-mining company Choicepoint has decided to discontinue the sale of some sensitive consumer data, following a hacking attempt on its database.
David Quainton Mar 7 2005 5:09PM Security
Dire data destruction creates security nightmare

Dire data destruction creates security nightmare

Organisations are putting themselves at risk by not properly deleting files before selling on old computers according to new research.
David Quainton Feb 17 2005 4:42PM Security
3G dream a security nightmare

3G dream a security nightmare

Smart mobile technology is rapidly gaining in popularity – and hackers and crackers are among its biggest fans! Very few consumers know about the vulnerabilities of 3G technology, and only now is the industry waking up to the potential security nightmare.
Dr Hamid Feb 2 2005 1:08PM Security
Spam nightmare grows for small firms

Spam nightmare grows for small firms

Small companies are suffering at the hands of spammers, because they do not have the correct defenses in place. A new report reveals that companies with 100 users or fewer can receive up to ten times more spam than large businesses.
David Quainton Jan 27 2005 11:52AM Security
Stealth wireless creates security nightmare

Stealth wireless creates security nightmare

Stealth implementation of remote access systems is creating a security nightmare, new surveys have revealed. Companies are failing to create adequate polices to govern the safe use of Blackberrys, laptops and smartphones, leaving holes through which systems can be compromised.
David Quainton Nov 16 2004 12:41PM Security

Log In

  |  Forgot your password?