Quantcast
Browsing all 4495 articles
Browse latest View live

Inoapps’ Latest Webinar Delivers An Accessible Introduction To Oracle Licence...

Award winning Oracle Platinum Partner Inoapps (www.inoapps.com) has announced an upcoming executive webinar that will provide businesses with an accessible introduction to Oracle Licencing. The webinar...

View Article


Hyde selects 1st Touch Mobile to deliver mobile working solutions

The Hyde Group, one of London's leading social housing providers, has chosen the enterprise mobile workforce software solution from 1st Touch (www.1sttouch.com) to help deliver mobile working solutions...

View Article


Phone Fraud Is on the Rise, Pindrop Security Reveals

Pindrop reports that there are approximately 86.2 million phone scam calls per month in the U.S., and organizations can't trust Caller ID to prevent phone fraud. Phone scams are almost as old as the...

View Article

FBI Investigates Baseball Rival in Houston Astros Data Leak: Reports

A leak of sensitive documents from the Houston Astros baseball team’s front office may be the first known case of cyber-espionage between professional sports teams. An embarrassing leak of sensitive...

View Article

Websites Need to Guard Against More Vulnerabilities Than Just DDoS

Distributed denial-of-service attacks continue to hammer Websites, but software vulnerabilities and poor passwords continue to be the biggest worries. Studies have shown that denial-of-service attacks...

View Article


Latest Research Highlights Growing Insider Threat in Cybersecurity Landscape

The Insider Threat Spotlight Report, sponsored by Watchful Software, calls attention to major threat/risk vector and potential lack of preparedness for data breachMedford, NJ, June 19, 2015 - Watchful...

View Article

Hackers ground Polish airliners

LOT flights cancelled after unknown hackers target traffic control

View Article

Attack as the best form of defence – should we consider unleashing cyber...

Neil Anderson, security director at Farrpoint, believes firms should be able to retaliate against cyber criminals

View Article


‘Google has been recording our voices without our consent,’ say Chromium users

Company admits it has been capturing audio - but only if a particular box has been ticked...

View Article


Linux Foundation Invests $452,000 in Open-Source Security Projects

The Linux Foundation's Core Infrastructure Initiative (CII) is funding three projects aimed at helping to improve security for open-source code. The Linux Foundation's Core Infrastructure Initiative...

View Article

Security Startup Vera Now Can Protect Office 365 Documents

Vera secures and tracks any file that is created and moves through Office 365, Outlook, and OneDrive for Business. Cross-platform data security startup Vera has made available new data protection for...

View Article

PostgreSQL Powers All New Apps for 77% of the Database’s Users

Survey of open source PostgreSQL users found adoption continues to rise with 55% of users deploying it for mission-critical applications Bedford, MA - June 23, 2015 - EnterpriseDB (EDB), the leading...

View Article

International High Speed Rail win for telent

23 JUNE 2015 - Pioneering technology services company, telent Technology Services Ltd, has been awarded a three year contract by Network Rail (High Speed) Ltd to maintain the station management systems...

View Article


Government is worst industry sector for fixing security vulnerabilities,...

Veracode report suggests government fixes just 27 per cent of detected application vulnerabilities

View Article

DigiCert Grows SSL/TLS Business Via Verizon Enterprise SSL Deal

The acquisition expands DigiCert's enterprise SSL customer base and provides new security certificate options to Verizon's customers. DigiCert today announced that it is acquiring the CyberTrust...

View Article


Fitness Monitors Rife With Security Issues, Tests Find

Security testing service AV-Test analyzed nine fitness monitors and found numerous security weaknesses. Fitness monitors popular with consumers are at risk of leaking data and allowing attackers to...

View Article

DAC Beachcroft Chooses Zylpha’s Electronic Bundling

Leading international legal business DAC Beachcroft has chosen document bundling from Zylpha (www.zylpha.com), the UK's leading legal systems innovator.With more than 2,200 people and coverage across...

View Article


Security Specialists See Cyber Threats Growing

After privileged users, contractors and consultants (48 percent), and regular employees (46 percent) are the biggest threat to businesses. Privileged users, such as managers with access to sensitive...

View Article

From VOIP to Robots: Modern Tech Changes Phone Fraud Landscape

Phone fraud is not a new phenomenon, yet modern technologies, such as voice over IP (VOIP) and e-commerce, help make it easier for attackers to exploit victims. A recent report from Pindrop sheds new...

View Article

Adobe Fixes Another Zero-Day Flaw in Its Flash Player

Adobe rushes an out-of-band patch for its Flash Player to fix a zero-day vulnerability that already was being exploited in the wild. Adobe published an out-of-band security update on June 23, fixing a...

View Article
Browsing all 4495 articles
Browse latest View live