Data Protection — News
With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data.
As Netflix commits its future to streaming movies to customers, it relies almost exclusively on cloud services for its infrastructure, raising security concerns that require a new way of thinking, the company's cloud security architect says.
If you don't use it correctly, Facebook's new subscription feature can lead to a social networking mess: private posts and comments shown publicly, a cluttered news feed and spam.
Just when you were starting to get ahead of the curve when it comes to locking down the network and protecting PCs, everything went mobile. Not just laptops--but tablets, and smartphones that run unique operating systems and applications on completely different hardware. To help you combat the dramatic rise in mobile security threats, McAfee has developed Enterprise Mobility Management.
Adobe’s security team is rushing to deploy a multiple operating system patch for a cross-site scripting Flash Player flaw that has reportedly been used in targeted attacks.
The latest social engineering trick to get victims to open malicious email attachments accuses them of being spammers and threatens to sue them if they don't stop.
When it comes to social engineering attacks, larger companies attract more of them, and when they are victimized it costs more per incident, according to a survey sponsored by Check Point.
Social engineering attacks are widespread, frequent and cost organizations thousands of dollars annually according to new research from security firm Check Point Software Technologies.
Do you happen to be one of those people that really love Mac OS X Lion? Or perhaps, on the other end of the spectrum, you feel Lion's a bit too much like iOS? Well, now it's more than just similar, because if you happen to have an iPhone or iPod Touch, you can now make sure that Lion never leaves your side, with a bit of clever hacking.
We all know that administering the human factor in network security is a balancing act. On the one hand you do need to enforce policies to minimise basic weaknesses, especially lazy passwords (such as the ubiquitous “password”). On the other hand, you also need to manage the administrative impact of rigid policies - how many times can one person get it wrong!
Data protection concerns are preventing many UK companies from disposing of their working computers by sending them for reuse, a new survey from charity Computer Aid International has revealed.
Hacked Dutch certificate authority DigiNotar on Monday filed for bankruptcy, its US authentication company parent Vasco announced.
There's big trouble in the world of information security, and yet it seems that only a handful of us techies have noticed. What's the problem, you ask? Well, there are actually several problems, but they're all related to one very important issue: public trust. Let's take a look.
Japan's biggest defense contractor Mitsubishi Heavy has admitted that it was targeted by a major cyberattack last month in which at least 83 of its computers were infected with malware.
The Eli Lilly employee whose programming glitch exposed the e-mail addresses of almost 700 Prozac users to each other didn't know he was making history. Since that day in June 2001, hundreds more US healthcare organizations have reported medical-data breaches. As a result of those reports, federal and state health agencies have dealt out millions of dollars in fines, and the U.S. Department of Health and Human Services has launched a round of 150 audits. Meanwhile, a cottage industry of breach-notification service providers has arisen, and healthcare organizations can't find enough privacy talent to batten down the hatches.
In November 2009 the European Parliament approved a directive on Internet privacy that, among other things, required user opt-in before websites could install cookies on the user's computer.
Microsoft re-released an update today for Windows XP to correct a snafu that left users vulnerable to potential "man-in-the-middle" attacks for most of last week.
Former cybersecurity czar Clarke says smartphones, digital certificates create huge security problems
Former White House cybersecurity adviser Richard Clarke, author of the book Cyber War, served 19 years in the Pentagon, intelligence community and State Department.
There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.
Sign up now »
Automate business-continuity and disaster-recovery planning and enable crisis management in one solution.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.