SecuritySecurity also in this channel
Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony." read more »
A former manager of a GP surgery has pleaded guilty to charges of unlawfully obtaining personal data using the doctors’ patient records program. read more »
Content delivery services provider Akamai Technologies plans to buy Prolexic Technologies, a distributed denial-of-service (DDoS) mitigation specialist, for $370 million in cash. read more »
The City of London Police is taking over responsibility for Action Fraud, the national fraud and financially-motivated internet crime reporting centre. read more »
A popular Bitcoin discussion forum warned on Monday some user passwords may have been intercepted after the site's DNS (Domain Name System) registrar was breached. read more »more news ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
Indicators of Compromise (IOCs) are a valuable tool for administrators and network defenders. However, what happens when an attacker doesn't trigger the expected alerts, or worse, they blend in with alerts that go unnoticed or ignored? read more »
Earlier this month the Police Commissioner for the City of London, Adrian Leppard, wrote an open letter to The Times in which he painted a distinctly positive view of cyber-crime protection in the UK. read more »
The City of London’s Police Commissioner, Adrian Leppard, has been laughed at by cyber-security experts after writing an open letter to The Times this week, in which he refused to accept that police forces across the UK are struggling to get to grips with this new breed of cyber-criminals. read more »
Enterprise risk management may be old hat, but some CSOs are using it in innovative ways. Here's how it can bring your security program into the future read more »
After a DDoS attack was discovered by chance, 'later this year' is too long to wait. read more »more in depth ..
Most Popular in Security
Make sure you avoid the pass phrases on this list
Hackers make mistakes just as often as anyone else
National Fraud Authority is being shut down
An extraordinary - and unexpected - vulnerability in encryption has been found.
The attackers are using the "Pony" botnet command-and-control server software
Prevent access with a four-digit PIN code or beware - your device can be hacked!
Here are some of the best-known free security tools you can try inside your own network
Quick steps to improved ID and security management
A rapid evolution from the company's anti-virus originsread more »
Could you answer your auditor's basic questions?read more »more blogs ..
Also in slideshows :
Watch this on demand webinar which explores IT innovation, manged print services and business agility
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.