IBM will get €21m in state aid from Romania's government for a €51.2m project in the country that's expected to create around 900 jobs.
Big Blue is planning an IT consultancy project in Bucharest and Brasov, the Ministry of Finance told financial daily Ziarul Financier (translated by Google...
Tokyo, Japan - July 29, 2013 - Sony Corporation (‘Sony’) and Panasonic Corporation (‘Panasonic’) today announced that they have signed a basic agreement with the objective of jointly developing a next-generation standard for professional-use optical discs, with the objective of expanding their...
Mozilla has teamed up with BlackBerry to develop a tool which will allow researchers to better spot security vulnerabilities in web browsers.
The companies said that the tool would provide an open framework which security researchers could use to perform “fuzzing” techniques. Such practices are...
Nasa's cloud computing strategy came under fire from US authorities, with concerns raised about major security failings and a lack of communication and organisation.
The report from the US Office of Inspector General (OIG) stated that Nasa's cloud services "failed to meet key IT security...
The Australian Department of Defence has issued an official statement denying it banned the use of Lenovo computers over concerns they contained backdoor vulnerabilities.
A report from the Australian Financial Review last weekend claimed that the ban applied to top secret networks run by the...
The software powering the US National Security Agency's (NSA) powerful search techniques have been revealed. Called XKeyscore, the software is a basic web form which trawls through hundreds of billions of recorded internet traffic to list relevant results.
Revealed by the Guardian today...
Security firm PhishMe has unveiled new Phish Reporter technology designed to help employees more quickly alert IT departments about harmful messages.
The company unveiled the new service at Black Hat in Las Vegas, promising it will help companies better defend themselves from phishing and...
Microsoft (NSDQ:MSFT) is set to judge live attempts to bypass the security defenses in its latest operating system -- Windows 8.1 Preview -- giving hackers an attempt to earn $100,000 as part of the company's new bug bounty reward program.
Hackers will use their working exploits on a Lenovo...
An annual show-and-tell of some of the most alarming security breaches currently known is underway at two hacker conferences being held in Las Vegas this week. Cybersecurity researchers, hackers, government agencies and privacy advocates converge at Black Hat and Defcon to share the results of...
An internal report by the Massachusetts Institute of Technology has found that it committed no wrongdoing in the case of Internet activist Aaron Swartz, who committed suicide while facing charges he hacked into the university's computers and stole millions of online documents.
The report "makes...
A cyber-jihad has erupted between groups of rival Islamic hackers in Bangladesh and Indonesia, resulting in attacks on hundreds of sites.
The rival hackers have abandoned their normal pursuit of Israeli targets and have instead turned on each other. It is unclear which side started the war...
A trio of university researchers have developed a method for infecting iOS devices through the Apple power port.
Posing as a charger device, the Mactan proof-of-concept is able to pair with an iOS device, gain access to heightened privileges and install both hidden and visible applications onto...
Researchers are calling on mobile operators worldwide to drop support for femtocell units following harrowing proof-of-concept demonstration.
Security firm iSEC Partners drew a packed house at the conference when it demonstrated a simple system which compromised aVerizon femtocell unit and then...
Microsoft's upcoming launch of Windows 8.1 is set to include a host of features designed to simplify authentication and data protection, the company said.
Speaking with V3 at the 2013 Black Hat conference, Microsoft Windows security and identity group program manager Dustin Ingalls said that the...
Black Hat 2013 Researchers from Georgia Tech's Information Security Center (GTISC) claim to have found a way to sneak a malware-ridden app through Apple's inspection regime, and have also raised concerns about “malicious chargers” for iPhones.
The GTISC team explains its research here and...
D-Link has issued patches for a pair of its network video recorders after a Qualys analysis identified remote authentication bypass vulnerabilities.
The DNR-322L and DNR-326 recorders are midrange 4TB recorders which among other things can be used as recorders for the company's IP cameras. As...
Black Hat 2013 Security researchers have warned against the industry's use of femtocells after successfully hacking into two popular models of femtocell, allowing them to intercept voice and SMS information from nearby mobile devices.
The exploit was detailed by iSEC Partners at the Black...
Black Hat 2013 Security researchers have shown how hackers can use ad networks to create ephemeral, hard-to-trace botnets that can perform distributed-denial-of-service attacks at the click of a button.
In a presentation at the Black Hat conference in Las Vegas on Wednesday, researchers...
Black Hat 2013 NSA head General Keith Alexander believes the NSA's data-slurping programs should "be something we put forward as an example to the rest of the world," due to the oversight afforded by the courts, Congress, and the administration.
The spy chief made his remarks at the Black...
OCSP Stapling in Firefox'
dkeeler
OCSP Stapling has landed in the latest Nightly builds of Firefox! OCSP stapling is a mechanism by which a site can convey certificate revocation information to visitors in a privacy-preserving, scalable manner.
Revocation information is important...