Latest news - Page 775
It pays to know who your Facebook Friends are...
Wed, 28th Aug 2013
#
cybersecurity
#
apple
#
trend micro
A journalist's close call with a cunning Facebook phishing scam highlights the perils of unfamiliar friend requests and the need for vigilance.
No Android security software? You're playing with fire…
Mon, 19th Aug 2013
#
malware
#
cybersecurity
#
mobility
ESET launches redesigned ESET Mobile Security for Android, in a bid to enable users to enjoy safer mobile technology without compromising performance.
5 key questions to improve Big Data governance
Wed, 14th Aug 2013
#
data analytics
#
martech
#
planning
Big data, dubbed 'the new oil', can raise significant risk, ranging from disastrous data breaches to privacy and compliance concerns.
$100K Reward: Microsoft Bounty Hunters
Thu, 1st Aug 2013
#
cybersecurity
#
microsoft
Microsoft is paying up to $100k to hackers who can find bugs and vulnerabilities in its software as part of its bug bounty program.
Internet hackers Royally scam users
Wed, 31st Jul 2013
#
email security
#
cybersecurity
#
symantec
While the world celebrated, scammers have taken advantage, kicking into immediate action following the birth of the royal baby.
Is your Android phone stale…?
Mon, 29th Jul 2013
#
cybersecurity
#
trend micro
#
technology gifts
How can a phone be stale and how can you tell? It's not like bread where you can squeeze it and tell it's stale because it's hard and know it's not good to eat.
Why taking down Apple's Developer site was a good idea...
Fri, 26th Jul 2013
#
cybersecurity
#
apple
#
trend micro
If we had more companies respond to breaches in this way, we (technology, privacy, security and cyber threats) would be much better off as an industry.
The dangers of SnapChat...
Fri, 19th Jul 2013
#
apple
#
trend micro
#
snap
This message will self-destruct in five seconds. That's the premise behind SnapChat and is hailed as the new Instagram...
Event Invite - Stop cyberattacks with Palo Alto
Wed, 10th Jul 2013
#
cybersecurity
#
cyber attacks
#
apt
Protect your business from cyber threats with Palo Alto's webinar on July 17, learning the lifecycle of attacks and how to stop them.
Master key makes 99% of Android devices vulnerable
Fri, 5th Jul 2013
#
cybersecurity
#
technology gifts
#
android
Master key could affect any Android phone released in the past four years, representing nearly 900 million devices and 99% of the market.
Microsoft offers $100k bounty to hackers
Thu, 20th Jun 2013
#
cybersecurity
#
microsoft
#
windows
In a change of tact, Microsoft is willing to cough up financial rewards for anybody capable of finding security flaws in Windows 8.1.
Key: Snowden not welcome in NZ
Thu, 13th Jun 2013
#
data privacy
#
apple
#
government
As rumours surface that Edward Snowden may seek refuge in New Zealand, Prime Minister John Key insists the US govt whistleblower is not welcome.
US govt whisteblower revealed
Mon, 10th Jun 2013
#
uc
#
data privacy
#
google
Whistleblower Edward Snowden denies he is hiding and says the focus should be on US government and tech companies.
Tech giants deny US govt privacy probe
Mon, 10th Jun 2013
#
data privacy
#
microsoft
#
google
Microsoft, Google, Apple, Facebook, Yahoo and other US companies deny assisting US officials in collecting customer private data since 2007.
Humans cause data breaches. Fact.
Fri, 7th Jun 2013
#
dlp
#
healthtech
#
symantec
Eight years of research on data breach costs has shown employee behaviour to be one of the most pressing issues facing organisations today.
Microsoft attacks global cyber criminals
Fri, 7th Jun 2013
#
cybersecurity
#
microsoft
#
fbi
Microsoft, in concert with the FBI and global authorities, has dismantled over a thousand botnets behind USD $500 million in financial fraud.
Symantec warns of online security threats growth
Wed, 29th May 2013
#
symantec
#
westcon-comstor
#
distributors
Security software company tells TechDay at the Westcon Imagine Event that online security threats are on the rise.
Cyber-attacks: 5 things companies should know
Fri, 17th May 2013
#
physical security
#
cybersecurity
#
hackers
Businesses are increasingly prey to sophisticated cyber-attacks targeting intellectual property, reveals a new guide by ISACA and experts at Ernst and Young.
Regain control through RSA's risk-based authentication
Wed, 8th May 2013
#
emc
#
rsa security
RSA's new software promises secure, cost-effective risk-based authentication, cutting user costs by up to 40% and ensuring enterprise-wide protection.
Sony hacker finally sentenced
Fri, 19th Apr 2013
#
gaming
#
digital entertainment
#
sony
The gaming community has a pretty short memory, but one of the hackers involved in the onslaught of attacks against Sony has finally been sentenced.