Feedback

Security Professional

Chinese hackers break into US military contractor systems

1 hour ago  by Jamie Hinks
Chinese hackers break into US military contractor systems
A total of 12 different contractors were breached by the hackers and the companies targeted deal with US military logistics such as transportation of weapons and personnel.

Android Browser ‘privacy disaster’ potentially affects 50% of users

4 hours ago  by Jamie Hinks
Android Browser ‘privacy disaster’ potentially affects 50% of users
The bug affects the company’s Android Browser that is present on many devices before Android 4.2 and it can steal any information put into a browser such as passwords and cookies.

eBay’s latest setback: Redirect attack threatens account details

9 hours ago  by Barclay Ballard
eBay’s latest setback: Redirect attack threatens account details
The attack is the latest in a series of technical issues to plague the online auction site in recent months, with the US firm taking over 12 hours to remove the malicious redirect links.

If Scotland votes ‘Yes’ to independence in the referendum, what will happen to our data?

14 hours ago  by Lubor Ptacek
If Scotland votes ‘Yes’ to independence in the referendum, what will happen to our data?
Scotland goes to the polls today to vote on independence from the Union. If a 'Yes' vote is passed, it will throw into question the massive issue of data sovereignty.

New study says risky behaviours are putting our online security in jeopardy

16 hours ago  by Ian Barker
New study says risky behaviours are putting our online security in jeopardy
We all say that we want privacy and security online, yet we indulge in potentially risky behaviors that put this in jeopardy according to a recent study commissioned by Trend Micro.

Today’s tech: Apple poaches Android users, the best way to develop apps and WikiLeaks releases positive malware

17 Sep 2014  by Nathan Chai
Today’s tech: Apple poaches Android users, the best way to develop apps and WikiLeaks releases positive malware
The best of ITProPortal news including: Apple's renewed attack on Android market share, the agile/waterfall debate finally gets settled, and WikiLeaks releases government-owned malware into the wild.

Post breach security: CARM after the storm

17 Sep 2014  by Graham Jones
Post breach security: CARM after the storm
Data breaches are becoming frequent and increasing in severity, meaning it's a case of when a business will suffer a data breach, not if, writes Graham Jones of Exclusive Networks.

Agile vs waterfall: Which working method is best for app developers?

17 Sep 2014  by Aatif Sulleyman
Agile vs waterfall: Which working method is best for app developers?
After gathering data from 1,316 applications, consisting of over 700 million lines of code, software analysis firm Cast has concluded that a mix of agile and waterfall produces the best results.

WikiLeaks releases copies of FinFisher ‘weaponised surveillance malware’

17 Sep 2014  by Darren Allan
WikiLeaks releases copies of FinFisher ‘weaponised surveillance malware’
The malware has been released to help build defences against it, and Julian Assange took the opportunity to question why the 'Merkel government' continues to protect FinFisher.

UK web users 2.5 times more likely to receive phishing scams than US

17 Sep 2014  by Mark Wilson
UK web users 2.5 times more likely to receive phishing scams than US
Phishing scams are a problem around the world, but research by Proofpoint shows that it is more of a problem in some places than others.

Today’s tech: Governments pester Google for user data, Kindle infiltrated by hackers, Startup Institute gains more partners

16 Sep 2014  by Nathan Chai
Today’s tech: Governments pester Google for user data, Kindle infiltrated by hackers, Startup Institute gains more partners
The best of ITProPortal news including: Google release transparency report detailing the full extent of government snooping, hackers use e-books to steal, and Startup Institute finds more partners.