vulnerability - News, Features, and Slideshows

News

  • The 'super easy' way to hack a Swede's email account

    When you forget your Gmail password, and have two factor authentication (2FA) enabled, Google will SMS or call you with a six to eight digit code. You enter the code (Google calls this 2-step verification) and gain access to your account.

    Written by George Nott12 April 19 09:00
  • Gov backed cyber survey sent to top 100 Aussie companies

    ​Invitations to complete an ASX and ASIC backed cyber survey have been sent to Australia’s 100 biggest companies today with an advisory note: don’t let your CIO fill it in.

    Written by George Nott09 Nov. 16 11:29
  • Healthcare firms biggest target for cyber crooks

    ​The global healthcare sector experienced more than three times the number of security incidents than the average industry and is twice as likely to encounter data theft, according to a report.

    Written by Bonnie Gardiner24 Sept. 15 12:49
  • New security flaws ID'd in BlackBerry 6 OS, enterprise IM apps

    It's been more than two months since Research In Motion (RIM) reported a BlackBerry smartphone or BlackBerry Enterprise Server (BES) security flaw, but the Canadian company has announced a handful of recently discovered vulnerabilities in its BlackBerry 6 handheld OS and BES for IBM Lotus Notes and Microsoft Exchange. BlackBerry Torch 9800 with Padlock (Image Credit: Brian Sacco)

    Written by Al Sacco25 Oct. 11 03:30
  • HTC breach a reminder on mobile security

    It's hardly the kind of thing any company wants attached to its name, but HTC's rapid acknowledgment of confessed "serious" security exploit, discovered and published this week by security researchers, may ultimately help deflect criticisms and will, regardless, serve as a valuable reminder to CSOs that mobile devices represent a new and still-evolving security threat within the enterprise.

    Written by David Braue07 Oct. 11 15:58
  • Night Dragon brings security vulnerabilities into the boardroom

    A hacking operation dubbed ‘Night Dragon’ has targeted energy utilities, using tried-and-tested intrusion methods to steal intellectual property related to oil field exploration and bidding plans, according to security company McAfee.

    Written by Georgina Swan11 Feb. 11 10:06
  • Cisco vulnerability could allow billing system rorting

    Cisco is warning that a vulnerability in its second generation Cisco Content Services Gateway (CSG2) could allow hackers to bypass billing policies and gain access to restricted sites.

    Written by Computerworld Staff27 Jan. 11 13:17
[]