Lax password implementation has meant that operational technology (OT) is now vulnerable to security attacks.

Lax password implementation has meant that operational technology (OT) is now vulnerable to security attacks.
Everything you have heard about cyber security is wrong, according to Gartner VP and distinguished analyst, John Girard.
A Facebook engineer blamed language difficulties and documentation issues for a delay in fixing a bug that let a security researcher post directly to founder Mark Zuckerberg’s Timeline, which is restricted if two users aren’t friends.
Acting like a software version of a Transformer robot, a malware test app sneaked through Apple’s review process disguised as a harmless app, and then re-assembled itself into an aggressive attacker even while running inside the iOS “sandbox” designed to isolate apps and data from each other.
Chinese hackers are using an automated tool to exploit known vulnerabilities in Apache Struts, in order to install backdoors on servers hosting applications developed with the framework.
Google is upping the rewards it offers to bug hunters on its Chromium Vulnerability Rewards (VRP) program to AED 18,365 ($5000) for those previously rated at AED 3,673 ($1,000), the firm has announced.
A significant global talent shortage is looming as companies seek to leverage Big Data for competitive advantage but struggle to …
Investing in anti-virus software is no longer enough to counter cyber attacks on vital data systems, especially if national security is at stake.
Android vulnerabilities make for some of the biggest security concerns of the moment, according to Trend Micro’s Q2 2013 Security Roundup Report.
It may be old news now, but hackers are still using news of the royal baby’s birth to entice people into clicking on malicious links, according to researchers at Trend Micro.
If US intelligence agencies ban the computers of a Chinese company from classified networks should companies also avoid the same products? What if the vendor is one of the world’s largest PC makers?
The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.
Distributed Denial of Service (DDoS) attacks are getting bigger, but their duration are getting shorter, according to an analysis released …
A Home Affairs Select Committee has stated that the UK is losing the war on online criminal activity and that the government is too complacent in targeting cyber criminals.
F5 Networks says its BIG-IP 10200v with Advanced Firewall Manager (AFM) can handle traffic at 80-Gbps rates while screening and protecting tens of millions of connections, and simultaneously load-balancing server traffic.
With the major developers of banking malware laying low, a new crook on the block has emerged gunning to be top dog in the market.
Cyber-criminals are compromising websites at hosting companies at an ever-furious rate.
The impact of hacked SIM cards, one of the few stalwarts in the high-tech industry that has not seen a serious exploit, could be monumental.
The vulnerability was reported Thursday to Oracle along with proof-of-concept (PoC) exploit code.
Ransom attackers have finally made the jump from Windows to the Mac with news of a stunningly simple hack that tries to trick browser users into paying a $300 (£200) fine using a simple JavaScript routine.