Multiple Java versions on endpoints risky for enterprises
Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …
New ReadyNAS rackmount devices from NETGEAR
NETGEAR announced ReadyNAS 3220 and ReadyNAS 4220, the latest NAS products to run on the ReadyNAS OS, introduced in March 2013. Available in 2U rackmount form with 12-bay …
Passwords of 1.8M Ubuntu Forums users compromised in hack
Ubuntuforums.org, the home of a variety of support forums dedicated to users of this popular Linux distribution, has been hacked over the weekend and defaced to show an image …
Apple developer center hacked by security researcher?
The mystery of why Apple’s Developer Center has been inaccessible for users since last Thursday has apparently been solved, as UK-based security researcher Ibrahim Balic …
Apricorn unveils FIPS 140-2 encrypted USB 3.0 drive
Apricorn debuted its Aegis Padlock Fortress, a secure drive designed specifically for the stringent requirements of the Government, Military and Healthcare. The first USB 3.0 …
BT Security CEO to keynote RSA Conference Europe 2013
RSA Conference announced BT Security CEO Mark Hughes as a keynote speaker for the 14th annual RSA Conference Europe, taking place from 29 – 31 October 2013, at Amsterdam …
Week in review: Hijacking connected cars, Android backup flaw, help desk security threats
Here’s an overview of some of last week’s most interesting news and articles: UEFI secure boot: Next generation booting or a controversial debate One of the first …
Hijacking connected cars with a $25 tool
A presentation by two Spanish researchers scheduled to take place later this month at the Black Hat conference in Las Vegas will apparently prove that hijacking modern cars …
Huawei’s Chinese connection continues to be source of suspicion
A day after it was announced that the UK government will investigate the employees at the Huawei’s Cyber Security Evaluation Center located in Banbury, Oxfordshire, …
The future of electronic payment: Smartphone authentication and facial recognition
Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented …
Major vulnerabilities in office security and RFID systems
At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and …
ISACA updates IS Audit and Assurance Standards
ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards have an effective date of 1 November 2013. Introduced in 1988, the IS Audit and …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade