Russian hackers breach Pentagon email system
US Department of Defense email shut down and officials point the finger at Russia
View ArticleDefCon ProxyHam Talk Disappears, but Technology Is No Secret
VIDEO: Researchers at DefCon reveal the truth behind how ProxyHam technology works, enabling an attacker to proxy traffic wirelessly over a long distance. LAS VEGAS—Part of the drama at any Black Hat...
View ArticleDB Networks Appliance Applies Machine Learning to Thwart Hackers
The DBN-6300 security appliance and its virtual cousin, the VMware-powered DBN-6300v, offer advanced capabilities that make short work of identifying databases, analyzing database traffic and using...
View ArticleBlack Hat, DefCon Put Car Hacking, Web Privacy on Center Stage
LAS VEGAS—For more than a decade at the Black Hat USA and DefCon security conferences, researchers have studied and hacked computing technology. At the 2015 events held here from Aug. 3 to 9, a key...
View ArticleCyber-Attackers Targeting Web-Connected Fuel Tanks, Experiment Finds
A handful of attackers targeted fake fuel-tank monitors during a six-month month experiment, showing that real Internet-connected monitors are at risk, according to Trend Micro researchers. Attackers...
View ArticleMicrosoft Puts a Bigger Bounty on Bugs
The company promises bigger payouts for security researchers who find authentication exploits and submit ideas to strengthen Windows' defenses. Microsoft is increasing the rewards for security pros...
View ArticleAndroid Phones’ Fingerprint Sensors Vulnerable to Hackers
A flaw can allow hackers to copy images of a user's fingerprint from a phone's sensor and use it elsewhere with impunity. Android users have a new security issue to worry about, this time involving...
View ArticleIGEL appoints Steve Weston to grow thin client business in the South
Focus on increased support for the Channel to target SMB and Public Sector Reading, UK. August 10th, 2015 - IGEL Technology today announced the appointment of Steve Weston to accelerate its thin client...
View ArticlexMatters Kicks Off Fiscal Year with Strong Continued Growth Delivering...
Worldwide Customer Growth, Product Innovation Among Early Fiscal Year 2016 Company HighlightsLondon, UK - 11th August, 2015 - xMatters, inc., a leader in communication-enabled business processes, today...
View ArticleWatchful Software Releases RightsWATCH 7.0 for Enhanced Security and Compliance
RightsWATCH 7.0 more tightly integrates data classification and DLP strategies while enhancing the ability to securely share information with external users in collaboration with Azure RMS Medford, NJ,...
View ArticleHow to Lock Down Windows 10’s Privacy Settings
[unable to retrieve full-text content]Windows 10 has received plenty of praise, but privacy concerns also exist. By changing these settings, Windows 10 users will gain a lot more privacy.
View ArticleHow LinkedIn Secures Its Members and Itself
VIDEO: Cory Scott, director of information security at LinkedIn, discusses how the business social network integrates security. LinkedIn is among the world's most popular social networking platforms...
View ArticleAdobe Patches 34 More Bugs in Flash
Another month, another large patch load from Adobe. The company's August Patch Tuesday update released today provides fixes for 34 identified Common Vulnerabilities and Exposures (CVEs). The August...
View ArticleInvestors Search for IPO ‘Unicorns’ Among Cyber-Security Startups
Investors continue to pour cash into cyber-security ventures hoping for big initial public offering payoffs, but workforce issues and technology complexity add to the risk. Driven by a seemingly...
View ArticleInoapps’ New In2Cloud Service Delivers Oracle ERP Cloud Upgrades For...
Award winning Oracle Platinum Partner Inoapps (www.inoapps.com) has announced the launch of ‘In2Cloud' a new upgrade service that enables Oracle E-Business Suite users to move to Oracle ERP Cloud in...
View ArticleOracle: Mary Ann Davidson blog ‘does not reflect our beliefs or relationship...
Executive VP promises 'a robust programme of product security assurance' for licence holders
View ArticleDecision time for managed services
Leading vendors and Managed Service Providers to meet at summit in London next monthInitial sponsors announced[London, 12 August 2015] Which way forward for managed services in Europe? New research by...
View ArticleDocker 1.8 Improves Container Security With Content Trust
The open-source container technology now benefits from technology that can digitally sign and verify application containers. As the use of Docker containers has grown, so too have concerns over...
View ArticleFeds Accuse 9 of Using Stolen Press Releases to Make $100 Million
NEWS ANALYSIS: A major legal takedown of insider traders shows weakness in widely used press distribution mechanisms. When hackers look to find a target, a common objective is to find a choke point, a...
View Article