to

Airports - a threat to identity security

Airports - a threat to identity security

We all love the convenience of Wi-Fi to stay connected anywhere our laptops take us. In fact, you may be reading this article on your wireless-enabled laptop now. But just as the availability of Wi-Fi services proliferate, so does the number of hackers ready to take advantage of unsuspecting road warriors.
Corey O'Donnell, Jan 29 2007 7:53AM Security
Social Security numbers of 1.3 million Chicago voters distributed to candidates

Social Security numbers of 1.3 million Chicago voters distributed to candidates

The Social Security numbers (SSNs) of 1.3 million Chicago voters were compromised when they were distributed to city aldermen and ward committeemen this month.
Frank Washkuch Jan 25 2007 6:56PM Security
Report: Police struggling to cope with e-crime caseload

Report: Police struggling to cope with e-crime caseload

UK Police cannot cope with the growing number of cyber crime cases, including hacking, internet fraud and online child grooming, Scotland Yard admitted yesterday.
Fiona Raisbeck Jan 25 2007 4:37PM Security
BBC to build online world for kids

BBC to build online world for kids

CBBC prepares 'Second Life for kids' for Summer launch.
Clement James Jan 25 2007 10:13AM Software
SuSE users urged to update systems

SuSE users urged to update systems

Security vulnerability hits Linux system.
Iain Thomson Jan 25 2007 10:13AM Security
County treasurer accused of funneling US$1.2million to Nigerian fraud scam

County treasurer accused of funneling US$1.2million to Nigerian fraud scam

A former Michigan county treasurer was arrested last week for allegedly embezzling more than US$1.2 million in public funds to a Nigerian fraud scam.
Frank Washkuch Jan 24 2007 6:32PM Security
Microsoft to take Onecare security suite international

Microsoft to take Onecare security suite international

Vista launch likely to increase Microsoft's market share.
Tom Sanders Jan 24 2007 8:17AM Software
Cisco admits to iPhone GPL violation

Cisco admits to iPhone GPL violation

Vendor promises to 'resolve a single issue', but denies all other claims.
Tom Sanders Jan 24 2007 8:17AM Networking
Sun and Intel to push 8-way servers and Solaris

Sun and Intel to push 8-way servers and Solaris

Sun flip-flops back to Intel Xeon servers.
Tom Sanders Jan 24 2007 8:17AM Hardware
Google admits to user data disclosure

Google admits to user data disclosure

Anti-phishing list logged user names and passwords.
Shaun Nichols Jan 24 2007 8:17AM Security
Can security expenditure end with profits?

Can security expenditure end with profits?

Ever since the arrival of the first anti-virus software in the mid-1980s, accountants have been battling with IT managers to control and quantify the efficiency of IT security software.
Steve Gold Jan 24 2007 7:07AM Security
Mobile operators urged to prepare for WiMax threat

Mobile operators urged to prepare for WiMax threat

In-Stat warns that technology could become ally or foe.
Robert Jaques Jan 23 2007 9:13AM Telco/ISP
LG beats Apple to touch-screen mobile

LG beats Apple to touch-screen mobile

LG releases own model months before the iPhone.
Iain Thomson Jan 22 2007 9:38AM Telco/ISP
Linspire brings place shifting to Linux

Linspire brings place shifting to Linux

Deal with SageTV lets users watch, pause and record TV on Linux PCs.
Clement James Jan 22 2007 9:37AM Software
Seagate revs up drive speeds to 15K

Seagate revs up drive speeds to 15K

World's fastest drive, vendor claims.
Robert Jaques Jan 19 2007 9:39AM Storage
Apple 'wise' to lock down iPhone software

Apple 'wise' to lock down iPhone software

Researcher suggests limited software access will discourage attackers.
Shaun Nichols Jan 18 2007 9:35AM Security
Singer raises US$50,000 online to cut album

Singer raises US$50,000 online to cut album

Internet investors take a punt on new talent.
Iain Thomson Jan 18 2007 9:35AM Oddware
Sun patches flaw vulnerable to malicious image files

Sun patches flaw vulnerable to malicious image files

A flaw has been reported in Sun Microsystems Java Runtime Environment that can be exploited by a malicious user to compromise an affected system.
Frank Washkuch Jan 18 2007 7:32AM Security
Train to prevent social media attacks

Train to prevent social media attacks

If there is one certainty in the security business, it is that security professionals and hackers are in a constant battle to protect and exploit vulnerabilities.
Mark Zielinski, Jan 17 2007 11:42PM Security
Legal matters: How to make AUPs stick

Legal matters: How to make AUPs stick

Can organisations enforce Acceptable Use Policies? Tamzin Matthew investigates.
Jan 17 2007 12:15PM Security

Log In

  |  Forgot your password?