Tel: +61 2 9906 1592 | Fax: +61 2 9906 1596 | Email: email@example.com
A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace.
Dropbox has revealed additional IT admin controls as it continues its bid to lure business customers.
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
Red Hat Enterprise Linux: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. CVE-2014-1547, CVE-2014-1555, CVE-2014-1556, CVE-2014-1557
Red Hat Enterprise Linux: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. CVE-2014-1547, CVE-2014-1555, CVE-2014-1556, CVE-2014-1557
Red Hat Enterprise Linux: Updated nss and nspr packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. CVE-2013-1740, CVE-2014-1490, CVE-2014-1491, CVE-2014-1492, CVE-2014-1544, CVE-2014-1545
The U.K. government has adopted ODF as its standard for the exchange of word processor and spreadsheet files between departments and with citizens and suppliers, meaning that companies and citizens will not be required to buy a particular application or software suite in order to collaborate with government staff.
Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.
Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners.
A ransomware threat that encrypts files stored on the SD memory cards of Android devices has been updated to target English-speaking users with FBI-themed alerts.
Dropbox will continue beefing up the business version of its cloud storage and file sharing service, adding security features to shared links, full-text search capabilities and new tools for enterprise developers.
One of the complainants in an antitrust case against Google has slammed the European Commission for apparently adopting wholesale Google's proposal to settle the case, while giving complainants no fair chance to express their views on the settlement. Meanwhile, the Commission is considering revising the terms of the settlement, according to media reports.
A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.
Red Hat Enterprise Linux: package updates: JBoss Operations Network 3.2 (3.2.0.GA Update 02) jboss-on-agent
Red Hat Enterprise Linux: Updated kdebase-workspace packages that fix several bugs are now available for Red Hat Enterprise Linux 6.
RSA's annual Asia Pacific & Japan conference kicked off in Singapore on Tuesday. RSA executive chairman Arthur W. Coviello called for an end to cyber warfare while Juniper Network's Kevin Kennedy compared the Information Age to the Golden Age of the Roman empire. The conference concludes today.
If we are not careful in the decisions or actions that we take online today, the Information Age may go the way of the Roman Empire, according to Juniper Networks senior director of product management Kevin Kennedy.
A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.
Cyber weapons will never be completely eliminated but bi-lateral agreements between countries about the use of these weapons could establish boundaries, according to RSA executive chairman Arthur W. Coveillo.
Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a new post by a forensics scientist, iOS author and former hacker, who this week created a stir when he posted a presentation laying out his case.