Search Images Maps Play YouTube News Gmail Drive More »
Settings | Sign in

Computer security

'Holiday snaps' will be hacked unless businesses improve their cyber security, says minister

Telegraph.co.uk - ‎May 26, 2016‎
Technology giants and businesses need to improve their cyber security or people's "holiday snaps" will be hacked, a Cabinet Minister has suggested.

Debunking seven fundamental cyber-security myths

BetaNews - ‎May 27, 2016‎
If we look at the world of cyber security through the eyes of the media, it's a pretty frightening view. We hear story after story of security breaches hitting major companies and the next data leaks that follows affecting thousands of people.
See realtime coverage

The TSA is failing spectacularly at cybersecurity

Engadget - ‎May 20, 2016‎
Five years of Department of Homeland Security audits have revealed, to the surprise of few and the dismay of all, that the TSA is as great at cybersecurity as it is at customer service. The final report from the DHS Office of Inspector General details ...

Search of old computer files allowed by US appeals court

VentureBeat - ‎May 28, 2016‎
(Reuters) - Federal agents acted in good faith in executing a warrant to search a Connecticut accountant's records that had been seized 2-1/2 years earlier, a U.S.
See realtime coverage

Brazilian companies rank worst among major economies on cyber security: report

Yahoo News - ‎May 26, 2016‎
WASHINGTON (Reuters) - Companies based in Brazil scored “significantly poorer” in aggregate on a variety of cyber security indicators than those based in other major world economies, such as the United States and China, according to a report released ...
See realtime coverage

Random Number Generator: Study Finds New System to Make Lottery, Computer Security Unpredictable

University Herald - ‎May 19, 2016‎
Random number generator research paper by University of Texas is a remarkable new method to generate random numbers that can improve how computer security is doing its job. The generated random numbers have been an important element in any ...
See realtime coverage

Top-level domain expansion is a security risk for business computers

Computerworld - ‎May 25, 2016‎
The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between domain names used inside corporate networks and those that can now be registered on the public Internet.

14 cybersecurity terms you need to know

NewsOK.com - ‎May 26, 2016‎
Cybersecurity has become an important topic for everyone. With people and companies being hacked on a daily basis it is important to know what you're up against.

Israel's cyber security frontier

ComputerWeekly.com - ‎May 23, 2016‎
Israel exports more cyber security-related products and services than all other countries in the world combined, excluding the US.
See realtime coverage

EU-wide cybersecurity rules adopted by the Council

EU News - ‎May 18, 2016‎
On 17 May 2016, the Council formally adopted new rules to step up the security of network and information systems across the EU.
See realtime coverage

National Cyber Security Centre To Offer Cyber Advice For Businesses

TechWeekEurope UK - ‎May 25, 2016‎
computer security “In the last year, two thirds of large businesses in the UK experienced an cyber attack,” explained Hancock.

Europe adopts new cybersecurity rules for key players

The Register - ‎May 18, 2016‎
The European Council has adopted new cybersecurity rules to make networks and information services across the European Union safer and more secure.

5 unified threat management products to simplify your cyber security

Computer Business Review - ‎May 24, 2016‎
The shift to UTM is part of a move by cyber security customers away from complex systems of bolted together solutions and towards dealing with a single vendor and most importantly, a single system of alerts.

Report urges government tax breaks for cyber security investment

ComputerWeekly.com - ‎May 18, 2016‎
These include establishing an industry-wide cyber forum to complement existing bodies and initiatives; encouraging information and best-practice sharing; encouraging support for the UK cyber security sector; and encouraging cyber hygiene standards in ...
See realtime coverage

Celebrity hacker Guccifer's confession gives us all a lesson in security

Computerworld - ‎May 26, 2016‎
... hacker Guccifer, who has admitted to compromising almost 100 email and social media accounts belonging to U.S. government officials, politicians and other high-profile individuals, is the latest proof that humans are the weakest link in computer ...
See realtime coverage

Landmark computer hacking archive deposited at TNMOC

The Register - ‎May 18, 2016‎
Receiving the archive, TNMOC trustee Margaret Sale commented: “We are extremely grateful to Robert Schifreen for donating his fascinating archive to TNMOC and giving us an insight into what now seems a very strange world in which computer security ...
See realtime coverage

Next PM must spend $1 billion on cyber safeguards: report

ABC Technology and Games - ‎2 hours ago‎
... we don't have a TAFE curriculum and then we have IT curricula which are generally accredited by the Australian Computer Society but we don't have any national curriculum, undergraduate curriculum, approved in anything that can be called cyber security.

Rwanda: Kigali Installs US$3 Million Cyber Security System to Curb Online Crimes

AllAfrica.com - ‎May 23, 2016‎
Rwanda has become the second country in the region after Kenya to launch a cyber security system aimed at protecting public and private institutions against online crimes.

Internet laws a time-bomb | Bangkok Post: opinion

Bangkok Post - ‎13 hours ago‎
Its members must knock back these computer-security bills. It is time for the public to be informed of just what is in and behind these laws.
See realtime coverage

Optus and Macquarie Uni partner on cyber security

Computerworld Australia - ‎12 hours ago‎
Macquarie University and Optus Business will launch a 'cyber security hub', the organisations confirmed this morning.
 -