Perforce Open Sources Tools to Facilitate Customised Java Workflows
P4Java and P4Eclipse Are the Latest in 20+ Tools Available in Perforce's Open Source Workshop Key Points:Perforce has released the source code for its Eclipse plug-in (P4Eclipse) and Java API (P4Java)...
View ArticleHow Heartland Payments Is Securing Its Future
VIDEO: Bob Carr, CEO of Heartland Payments, discusses the lessons he learned from his company's major data breach and why he's optimistic about the future. Robert (Bob) Carr knows firsthand what it's...
View ArticleMasterCard’s Plans for Facial Recognition Raise Questions
NEWS ANALYSIS: MasterCard's plans to add facial recognition as a means of verification might help secure online transactions, but at what cost and what risk? MasterCard is experimenting with facial...
View ArticleMalicious PDFs Poison Google Search Results
A new SophosLabs report claims that malware-infected PDFs are influencing Google's search results. Getting a top ranking in Google's search engine is supposed to be an organic task, with the best...
View ArticleAccess Control Technology (ACT) Provides Enterprise-level Security Solutions...
Seoul, Korea and Birmingham, UK — 8 July, 2015 — Suprema, a leading global provider of biometrics and security technology, is pleased to announce that Suprema biometric devices can now be paired with...
View ArticleAustralian Practice Sparke Helmore Chooses Zylpha For Visualfiles Development...
Australian legal practice Sparke Helmore has chosen the DeveloperPlus solution from Zylpha (www.zylpha.com) to provide Development and Support cover for its existing Visualfiles case management...
View ArticleHow Enterprises Can Break the Cyber-Attack Lifecycle
Cyber-attacks on enterprises and governments are in the news nearly every week—sometimes every few days. As defenses have attempted to thwart the bad actors and their invasive tools, the origination...
View ArticleAdobe Patches 36 Flaws, Including a Zero-Day, in Flash Player
If you use Adobe Flash (and you probably do), it's time to update (again). Adobe came out today with the APSB15-16 security bulletin providing patches for 36 security vulnerabilities in Adobe Flash...
View ArticleGoogle Must Offer U.S. Users ‘Right to Be Forgotten': Consumer Group
Consumer Watchdog filed a complaint with the FTC that Google's failure to offer a 'right-to-be-forgotten' option to Internet users in the U.S. is unfair. Consumer Watchdog, a long-time critic of...
View ArticleLatest DoS Attacks Used Old Protocol for Amplification
Akamai finds that attackers have revived RIPv1, a decades-old protocol, to amplify their DoS attacks against targets. Attackers are using a three-decades-old Internet protocol for passing network...
View ArticleTechnology the Focus of NYSE, United Airlines Problems
Software and routers issues brought things at the exchange and airline to a halt for hours, raising concerns about computer resiliency and safety. The four-hour stoppage of trading on the New York...
View ArticleRiskIQ highlights website security risks for UK’s top companies as end of...
With days to go before Microsoft Windows Server 2003 support ends, IIS 6.0 users are heading towards new security dangers.LONDON, UK, July 9, 2015 - Research from RiskIQ, the enterprise digital...
View ArticleAdobe rushes out patch to fix Flash security flaws exploited by Hacking Team
Fixes for flaws exploited by government hacking products company Hacking Team
View ArticleOpenSSL Patches for ‘Boring’ Certificate Risk
The open-source OpenSSL cryptographic library project came out today with a high-severity security advisory and patched a single vulnerability, identified as CVE-2015-1793. OpenSSL is a widely used...
View ArticleMurky world of zero-day malware trading uncovered as leaks show Hacking Team...
$50k and up is the asking price for exploits, leaked emails reveal
View ArticleLinux Foundation’s CII Now Assessing Open-Source Project Risk
The Linux Foundation's Core Infrastructure Initiative (CII) is creating a risk score for open-source projects to help identify those in need of funding and additional support. In the aftermath of the...
View ArticleOPM Admits Breach Had Wider Reach: 25.7 Million American at Risk
After weeks of speculation, the U.S. Government Office of Personnel Management discloses the full impact of the breaches on its systems. After weeks of speculation that the data breach of the U.S...
View ArticleHow the Wild Neutron Hacker Group Avoids Detection
The hacker group known as Wild Neutron is still actively attacking companies around the world, a number of years after the group was first discovered in 2011. Both Kaspersky Lab and Symantec have...
View ArticleGoogle Taps Neural Network Tech to Bolster Anti-Spam Efforts
The Gmail team is applying neural network technology that Google has used in other applications to detect spam while letting legitimate email go through. Google's Gmail team has improved how the email...
View ArticleOPM Director Resigns After Breaches, but the Real Work Remains
NEWS ANALYSIS: Katherine Archuleta's resignation as the director of the Office of Personnel Management is a necessary step, but it doesn't solve the problem of inadequate security or inept management....
View Article