Can mobile phones be hacked? As that question is debated in the wake of a family in Washington, US claiming the phones it uses have been <a href="http://www.thenewstribune.com/front/topphoto/story/91460.html" target="_blank">taken over by hackers</a>...
A Tacoma, Washington, family is claiming the mobile phones it uses have been taken over by hackers, who are turning them on at will, capturing conversations and manipulating the cell phone camera.
McAfee on Monday announced it will deliver an updated version of ePolicy Orchestrator, its umbrella management console for McAfee security products, by the third quarter of this year.
Adobe on Monday said it's broadening its LiveCycle Enterprise Suite development software to add a way to create wizard-like "Form Guides" and flash-based graphics so users can interact easily with PDF-based content online.
McAfee Monday pledged a renewed focus on the small-and-midsize business market, where the security firm said it's beefing up its product line and sales support.
IBM plans to announce a tool called Secure Perspective to help non-technical people establish security policies.
As she awaits a possible 40-year prison term, the case of Julie Amero, the substitute teacher in the U.S. convicted of exposing seventh-graders to Internet porn, has gained national attention from school IT administrators.
Entrust Wednesday announced an online anti-fraud service that can be a source for information research as well as provide Entrust's fraud-protection and third-party risk-assessment services.
Thousands of news articles each day are piped by <a href="http://www.reuters.com/" target="_blank">Reuters</a> into financial-services firms and other businesses to help them make decisions. Now Reuters has also come up with a way to machine-read thi...
Sourcefire, the security firm that oversees the open source intrusion-detection system software, Snort, is making available another open source tool for network traffic logging.
IBM's Internet Security System division has announced an intrusion-prevention system, the GX 3002, designed primarily to guard against attacks against small branch offices or machines, such as bank ATMs or kiosks.
While the vast majority of networks today are based on the IPv4 protocol, the U.S. government is mandating that defence and civilian agencies are ready to accept IPv6-based traffic as well by June 2008. Those guiding the effort know the transition wo...
Cisco this week unveiled its video-surveillance product strategy during ISC West, a conference being held in Las Vegas that focuses on physical security systems.
Core Security Technologies says it's discovered an IPv6-related buffer-overflow vulnerability in several versions of the OpenBSD operating system that would allow an attacker to knock a server offline or take control at the kernel level. The OpenBSD ...
PayPal has 133 million customers that use its Internet-based money-transfer service, which handled US$37 billion in transactions last year. Michael Barrett, who is CISO at the eBay subsidiary, recently spoke with Ellen Messmer about new approaches Pa...