The security breach at AT&T that exposed the e-mail addresses of a reported 114,000 owners of the iPad with Wi-Fi + 3G could potentially impact privacy more than was initially thought. Two security researchers told eWEEK that the ICCIDs (integrated circuit card identifiers) of iPad owners could be used to determine their IMSIs (International Mobile […]
Enterprises are getting back to business-driven security initiatives after putting off some large-scale projects last year, according to the Gartner analyst firm. While security spending tied to “keeping the bad guys out” was not heavily affected by the economy, many IT security organizations scaled back on capital-intensive projects in 2009, Gartner found. This year, however, […]
Osterman Research and software production management vendor Electric Cloud released a survey this month that laid most of the blame for major software bugs on poor testing procedures and infrastructure limitations as opposed to design problems. The survey included responses from 144 professionals including software developers, testers, managers and executives from organizations with at least […]
Check Point Software Technologies has acquired Liquid Machines for an undisclosed sum in a bid to strengthen its data security story. At the heart of the deal is Liquid Machines’ document encryption technology, which Check Point said extends its ability to secure data throughout the data lifecycle. According to Check Point, the deal adds to […]
AT&T confirmed a security breach exposed the e-mail addresses of 3G iPad owners. The breach was first reported by Gawker.com after a group called Goatse Security exploited a security hole on AT&T’s Website. As a result, the group was able to get its hands on the e-mail addresses of 114,000 owners of 3G iPads. “AT&T […]
An Australian collective of technology firms has developed an industry code in cooperation with the country’s government to help Internet Service Providers improve cyber-security. The Internet Industry Association’s (IIA) newly developed “icode” (PDF) provides a voluntary industry framework for how ISPs can respond to security issues affecting customers and how ISPs can go about dealing […]
Sophos has strengthened its cloud-based analytic capabilities to protect endpoints from malware and malicious websites. In Sophos Endpoint Security and Data Protection 9.5, Sophos has added what it calls “Live Protection,” a new spin on the company’s approach to the cloud. Rather than sending updates to endpoints from the company’s database of malicious URLs and […]
Apple released new versions of Safari June 7 with critical fixes for both Windows and Mac OS X users. Many of the bugs addressed in Safari 4.1 and 5.0 can be exploited to remotely execute code. Several of the vulnerabilities impacted WebKit, the open-source browser engine behind Safari. Here are some of the most serious […]
Cheating on a firewall audit can be tempting. So much so that roughly 1 in 10 IT pros surveyed by firewall management vendor Tufin Technologies admitted to cutting corners to get an audit passed. The results of the latest survey (PDF), which included responses from 242 IT pros that were mostly from organizations with 1,000 […]
Microsoft released 10 security bulletins today to address 34 vulnerabilities, including several with Microsoft’s highest exploitability rating. The exploitability rating ranks vulnerabilities according to the likelihood attackers will develop reliable exploit code. Three of the bulletins are rated “critical.” Among them is MS10-033, which plugs two Windows security vulnerabilities that could allow an attacker to […]