Just 11 days after issuing an advisory, Microsoft has released a patch for a bug in Internet Explorer 8 that bedeviled the U.S. Department of Labor earlier this month.
Adobe has released scheduled security updates for its Reader, Acrobat, Flash Player and ColdFusion products on Tuesday in order to fix many critical vulnerabilities, including one that is already actively exploited by attackers.
A California state court has dismissed a closely watched lawsuit charging that Delta Air Lines failed to comply with state privacy laws for mobile applications
In the battle for the next generation of enterprise IT, John Stratton carries a lot of weapons. Stratton is president of Verizon Enterprise Solutions, the nearly $30 billion unit formed just over a year ago to deliver networking, cloud, mobility, managed security, telematics and a host of other services in a more coordinated fashion for Verizon's top enterprise buyers. Building on a traditionally strong base of wired and wireless network services, Verizon Enterprise also blends in acquired assets like cloud hosting company Terremark, security company Cybertrust and Hughes Telematics. In this installment of the IDG Enterprise CEO Interview Series, Stratton spoke with Chief Content Officer John Gallant about Verizon Enterprise's progress since its inception, including a dramatic streamlining of internal systems and processes designed to make life much easier for the company's customers. Stratton also discussed the company's suite of services aimed at simplifying life for IT teams struggling with mobility and the influx of consumer devices, and he talked candidly about the prospects for a third mobile platform to rival Apple's iOS and Google's Android. He also talked about how cloud is reshaping the IT landscape and hinted at a series of major upcoming cloud announcements from Verizon Enterprise. Also, he explained how the "Internet of Things" is creating powerful new business opportunities for Verizon and its enterprise customers.
Back in 2007 Johnny Long came to a fork in the road. An accomplished IT security pro with 13 years working at one of the big names, he had a great career and family, but he didn't feel fulfilled. And he had no idea why not.
Hackers are finding it pays to call ahead before sending malware-laden email.
Mobile security vendor Lookout plans to start flagging as adware mobile apps that use aggressive ad networks if they don't obtain explicit consent from users before engaging in behavior that potentially invades privacy.
A heartless phishing gang that stole and frittered a British woman's entire APS1 million ($1.6 million) life savings on items including "gold and cheeseburgers" have been handed heavy sentences by a judge at London's Southwark Crown Court.
Kim Dotcom has ordered the removal from his Mega file-storage service design plans for a controversial one-bullet plastic gun.
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks.
Spammers revived some old scams during the first three months of 2013, according to Kaspersky Lab, but spam volumes remained flat.
The mobile industry's efforts to convince lawmakers that self-regulation alone is the best way to address growing concerns over privacy-invading mobile applications appears to be running into some headwind.
Google has released a draft of its next five-year plan for login authentication that tries to stay at least on par with criminal hackers, but recognizes that strong security requires industry collaboration.
BYOD guidelines are just being defined, but one warning must rise above the din: never, ever, try to gain unauthorized access to an employee's private social networking site.
Alberto Yusi Lajud Pena, found dead in the Dominican Republic two weeks ago, was the leader of the New York cell of an international gang of cyber thieves that authorities allege stole a staggering $45 million from ATM machines around the world.
Let's not mince words: Cyberattacks suck. Whether criminals are hacking our passwords, or Anonymous is simply making a statement, the disruptions and data breaches exact a heavy toll in terms of time, money, and security. For example, after the Associated Press Twitter account was hacked and bogus news was posted about an attack on the White House, the U.S. stock market took a nosedive.
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers.
A vast debit card fraud scheme that allegedly netted US$45 million has been linked to the hacking of credit card processors in the U.S. and India.
Many organisations exaggerate the difficulties of migrating from Windows XP to Windows 7 by over-estimating the importance of little-used applications, a survey from consultancy Centrix Software has suggested.
Hackers who commandeered The Onion's Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the publisher's technology team.