InformationWeek Security News


InformationWeek Security News

Software industry trade group urges policymakers to resist rules and regulations that curb data collection and analysis.

Critics say Oracle hasn't done enough to address ongoing security and code quality problems in the Java browser plug-in.

Appthority Portal gives customers greater granularity in determining and responding to mobile risk factors.

Major U.S. tech firms including Google, Facebook, Twitter, Microsoft and Yahoo! had rejected now-canned U.K. plan to make them archive user traffic, says newspaper.

Liberty Reserve bust underscores the danger posed by anonymous money transfers using virtual or digital currencies -- a facet of cybercrime increasingly under scrutiny by law enforcement.

HootSuite Security Services audits social assets, monitors for unusual Twitter account activity and offers crisis plans in the event of account takeovers.

Critics claim brutal slaying of soldier on London street could have been prevented by recently vetoed communications monitoring law.

In high-security PSN deal, Thales Group tapped to run U.K. Insolvency Service.

Hammond faces up to 10 years in prison and $2.5 million restitution for Stratfor, law enforcement hacks committed under the banners of Anonymous, AntiSec and LulzSec.

Executives at money-transfer business Liberty Reserve charged with running "bank of choice for the criminal underworld."

Controversial proposal says businesses should be allowed to lock down PCs they suspect contain stolen information. Privacy expert warns of fraud risk.

"Cyber exploitation" campaign obtained information relating to 29 weapon systems and 21 areas of cutting-edge research.

Two-step verification system has no provision for backup access or lost phones, doesn't address public username problem.

Our 1,029 respondents are getting wise on awareness, with just 13% saying they're more vulnerable than last year. Still, 73% see mobility as a threat, and 75% admit they may be ignorant of a breach.

Homeland Security vendor may have exposed employees' information ranging from Social Security numbers to names and birthdays.

Google will fully roll out RSA 2048-bit encryption by the end of this year.

Bug hunter criticizes Microsoft's "great hostility" to outside security researchers, releases proof-of-concept exploit for unpatched zero-day Windows vulnerability,

U.S. CIO VanRoekel says future for government is one where mobile is the default computing platform; highlights accomplishments of Digital Government Strategy.

Bipartisan report argues that businesses should be allowed to retrieve stolen intellectual property from attackers' networks.

Amazon cloud performance monitoring system goes a step further than competitors with specialized version that complies with federal security regulations.

Authentication measure comes in wake of Syrian Electronic Army account hacks, further security steps coming.

Dropbox says any off-the-shelf or homegrown identity management system that's compatible with the Security Assertion Markup Language (SAML) standard can be configured to automatically sign users into its service.

Google demonstrated a network of wireless environmental sensors at its I/O conference last week. These sensors, combined with projects like Google Glass, expose the potential for the use and misuse of relentless data collection.

Why do bad breaches happen to good companies? Here's a look at the most frequent causes.

Detective accused of hiring hackers to obtain webmail access credentials for 30 targets, accessing federal crime-information database without authorization.

Active Order: