using

Hackers forum gets hacked

Hackers forum gets hacked

Personal details revealed.
Dan Raywood May 21 2010 1:26PM Security
FBI warns of growing attacks using Facebook

FBI warns of growing attacks using Facebook

Scammers and phishers getting into social networking.
Iain Thomson Oct 2 2009 1:34PM Security
Seawater dampens data centre running costs

Seawater dampens data centre running costs

Mauritius to slash cooling bills.
Iain Thomson Sep 23 2009 6:08AM Oddware
Microsoft takes aim at shady advertisers

Microsoft takes aim at shady advertisers

Company files suit against purveyors of 'malvertising'.
Shaun Nichols Sep 21 2009 11:08AM Security
Hackers use spoofed WiFi access points to steal credentials as Switch Cascade introduced

Hackers use spoofed WiFi access points to steal credentials as Switch Cascade introduced

Spoof WiFi access points may cause a problem for users of wireless technology.
Dan Raywood May 22 2009 9:14AM Security
Researcher builds home-made Adobe flaw patch

Researcher builds home-made Adobe flaw patch

A researcher at threat management firm Sourcefire has published a home-made patch for the flaw that Adobe warned about on Friday.
Iain Thomson Feb 24 2009 3:35PM Security
Serious flaw found in Safari

Serious flaw found in Safari

A researcher has found a flaw that would allow hackers to steal information from those using Mac OS X 10.5, aka Leopard, or Safari for the PC.
Iain Thomson Jan 14 2009 2:08PM Security
Chinese ordered to stop using pirate software

Chinese ordered to stop using pirate software

A city in China has required Internet café operators to replace pirated software with legitimate versions – the officials primarily pushing Linux.
Emma Hughes Dec 4 2008 6:47AM Software
IBM unveils technology for 22nm chips

IBM unveils technology for 22nm chips

IBM has unveiled its strategy to produce future chips using a 22nm fabrication process.
Daniel Robinson Sep 20 2008 12:20PM Hardware
Mobile broadband achieves LTE handover

Mobile broadband achieves LTE handover

T-Mobile and Nortel have announced what they claim is the first handover and data transmission between a moving vehicle and a mobile operator base station using the Long Term Evolution (LTE) mobile broadband standard.
Dave Bailey Sep 20 2008 12:20PM Telco/ISP
ATM hackers net millions using stolen information

ATM hackers net millions using stolen information

A unique breach of bank information has hit one of the world's largest banks.
Chuck Miller Jun 20 2008 10:33AM Security
Boffins take gigapixel photos using ordinary camera

Boffins take gigapixel photos using ordinary camera

Scientists at Carnegie Mellon University have developed a device that lets a standard digital camera take pictures with a resolution of 1-gigapixel (1,000-megapixels)..
Iain Thomson May 17 2008 3:04PM Hardware
Hacker hired by News Corp. testifies in corporate spying trial

Hacker hired by News Corp. testifies in corporate spying trial

A software engineer testified that he was hired by a unit of News Corp. to develop software that could reverse engineer code on satellite receiver smart cards, but denies hacking.
Jim Carr Apr 28 2008 10:51AM Security
Know your privacy rights when using online social networking: Privacy Commissioner

Know your privacy rights when using online social networking: Privacy Commissioner

The Privacy Commissioner Karen Curtis has entered the privacy debate surrounding social networking sites announcing a new FAQ section on its website that helps minimise risks associated with the activity.
Staff Writers Dec 19 2007 12:09PM Security
Under half of IT managers using encryption

Under half of IT managers using encryption

IT security firm Check Point found that under half have deployed data encryption, and fewer than 40 per cent have any endpoint security deployed on PCs, laptops and mobile devices.
Staff Writers Dec 3 2007 10:40AM Security
Using international standards in your compliance program

Using international standards in your compliance program

In a world of ever-increasing information, security requirements and regulations, companies must manage a complex compliance environment that has resulted in a multitude of linked processes.
Gary Pearsons, Aug 7 2007 4:02PM Security
FBI tracked 'teen bomber' using spyware

FBI tracked 'teen bomber' using spyware

FBI agents trying to track down an anonymous MySpace user who was threatening to blow up a school used spyware to trap him.
Matt Chapman Jul 20 2007 6:39AM Security
Reporter admits using Wikipedia as source

Reporter admits using Wikipedia as source

Japanese hack claims information was 'common knowledge'.
Simon Burns Jul 6 2007 8:10AM Software
China to make UMPC using AMD technology

China to make UMPC using AMD technology

Finished product expected in one year.
Simon Burns Jun 28 2007 2:57PM Hardware
Using industry best practices for effective security training

Using industry best practices for effective security training

Growing IT security threats, coupled with regulatory mandates to protect information and ensure privacy, are generating a renewed focus on security awareness training programs, which can heighten security awareness, improve application and infrastructure security, and enhance security incident handling and response.
Luis Navarro, Jun 25 2007 11:31AM Security

Log In

  |  Forgot your password?