News for 24 May 2013 Year
17:34China, US to Try New Tone in Desert OutingChina and the United States are hoping for a new chance to set the course for smoother relations through a secluded desert summit
17:32DHS Says Software Vulnerability Put Sensitive Employee Information At RiskThe Department of Homeland Security warned its employees their personal data may have been exposed
17:31Despite high profile hacks, security is on right track says Cybercrime ReportThe latest quarterly report from PandaLabs concludes on a surprisingly optimistic note given the continuous revelations of high profile hacks and the...
17:23Computer Fraud and Abuse Act used to threaten journalistsJournalists who used Google Search to locate scores of unsecured social security numbers associated with the US Lifeline program have been threatened by...
17:22Google to lengthen SSL encryption keys from AugustBy the end of the year, Google's SSL certificates will use 2,048-bit keys
17:20Google to add Galapagos Islands to Street ViewFew have explored the remote volcanic islands of the Galapagos archipelago, an otherworldly landscape inhabited by the world's largest tortoises and other...
News for 23 May 2013 Year
17:31IT security vendors seen as clueless on industrial control systemsEven the most innocuous security processes used for traditional IT systems could spell disaster
17:30Economic future depends on e-ID, says Security Identity AllianceThe digital economies of European countries could account for up to 28% of GDP by 2020, but that depends on the successful roll-outs of electronic identities
17:21Congressional report: US power grid under continuous cyber-assaultA Congressional survey of utility companies shows that the US electric grid is warding off “daily,” “constant” and “frequent” cyber-attacks
17:20Twitter launches two-factor authenticationTwitter announced that it has joined other large cloud companies in offering two-factor authentication.
17:18CISOs Concerned Over 'Bring-Your-Own-Anything'CIOs and CISOs are worried about the security implications of Bring-Your-Own-Anything, BYOx, and how the trend affects corporate data
17:07Layered Security Approach Still Fails to Block Exploits: ReportLayered security may be security best practice, but many of the current technologies don't appear to be detecting and blocking exploits, according to recent...
The latest news
- 24.05.2013 | 17:34 China, US to Try New Tone in Desert Outing
- 24.05.2013 | 17:32 DHS Says Software Vulnerability Put Sensitive Employee Information At Risk
- 24.05.2013 | 17:31 Despite high profile hacks, security is on right track says Cybercrime Report
- 24.05.2013 | 17:23 Computer Fraud and Abuse Act used to threaten journalists
- 24.05.2013 | 17:22 Google to lengthen SSL encryption keys from August
- 24.05.2013 | 17:20 Google to add Galapagos Islands to Street View