HSBC confirmed that a former employee stole client data but said the number of records taken was less than 10. …
Hybrid warfare has altered the security landscape: cybersecurity experts
The blurring of lines between the different modes of warfare and weaponisation of non-military means undermine the foundation of the state is one of the most significant security challenges today, experts said.0 6169Red Hat open sources desktop application protocol
Red Hat has open sourced a virtual desktop protocol it acquired last year, called the Simple Protocol for Independent Computing …
Clearwire network down for hours in handful of cities
Clearwire customers in a handful of locations were unable to get online for several hours due to a network outage …
Facebook users speak out against new privacy settings
Many Facebook users expressed anger at the site Wednesday for changing privacy settings, which they say caused personal information to …
Microsoft patches 12 bugs, including IE8-only flaws
Microsoft patched 12 vulnerabilities in Windows, Office and Internet Explorer (IE), including three critical bugs in the company’s newest browser, …
Fortinet announces new high-performance messaging security solutions
Fortinet today announced the addition of two new high-performance, high-volume security systems to its FortiMail family of message security appliances. …
Fortinet announces new high-performance messaging security solutions
Fortinet today announced the addition of two new high-performance, high-volume security systems to its FortiMail family of message security appliances. …
Microsoft patches 12 bugs, including IE8-only flaws
Microsoft patched 12 vulnerabilities in Windows, Office and Internet Explorer (IE), including three critical bugs in the company's newest browser, …
Microsoft downplays Windows BitLocker attack threat
Microsoft dismissed recently-disclosed threats to its BitLocker disk-encryption technology as “relatively low risk,” noting that attackers must not only have …
Network IPS tests reveal equipment shortcomings
An independent test and evaluation of 15 different network intrusion-protection system products from seven vendors showed none were fully effective …