Data Protection — News
BoxTone has released a new version of its mobile device management software, which now works with existing enterprise policy-setting and security tools. This integration lets enterprise IT staff apply those tools to mobile users.
Microsoft today said it will issue a Windows security update to plug a long-known hole in the protocol that secures websites.
Microsoft is urging customers to update vulnerable versions of SSL to a newer one that is not susceptible to a recently published exploit called BEAST, but in the meantime it recommends steps that lessen the risk of being victimized.
Russia has for the first time laid the blame for the Stuxnet worm at the door of the US and Israel, describing it as "the only proven case of actual cyber-warfare."
Apple has updated the bare-bones antivirus protection included with Mac OS X to detect a Trojan horse that poses as a PDF document.
GM subsidiary OnStar's plan to collect and share GPS tracking and other data from vehicles even after their owners stop subscribing to its service has prompted an outcry from some lawmakers.
A mid-level organizer of an international online bank-theft ring that relied on the Zeus Trojan faces up to 45 years in prison when he is sentenced Jan. 13 after pleading guilty to conspiracy to commit bank fraud and possession of false IDs.
The website for the open-source MySQL database was hacked and used to serve malware to visitors Monday.
Mac malware is still quite rare, but there is one new threat floating around that you should be aware of. A new Trojan for Mac OS X disguises itself as an installer for the Adobe Flash Player browser plug-in, according to security software company Intego. The good news (if you want to call it that)? This new malware doesn't appear to have spread very far as of yet.
You may now be savvy enough to know that when a friend reaches out on Facebook and says they've been mugged in London and are in desperate need of cash, that it's a scam. But social engineers, the criminals that pull off these kinds of ploys by trying to trick you, are one step ahead.
Romania has long been considered a hotbed for cybercriminal activity, but in recent years law enforcement authorities have made significant efforts to crack down on online fraud gangs that steal millions every year from victims worldwide.
With Facebook's new Timelines and Open Graph apps, CEO Mark Zuckerberg has advanced his vision of a world that loves to share. Profile pages will soon summarize your life's history, and apps are now able to feed a steady stream of activity to friends and followers automatically.
BoxTone, an enterprise mobility management software provider, today announced new enhancements to its Enterprise Mobility Management (EMM) platform that are designed to help CIOs, CISOs and other IT managers meet security and compliance regulations while managing large numbers of employee- and corporate-owned mobile devices.
Protecting a well-established brand in the face of compromised systems is something Brad Clarence, the systems and support administrator at iconic fashion retailer, Jeanswest, knows a fair bit about. Despite his somewhat misleading title, Clarence is responsible for Jeanswest’s entire network and systems infrastructure in Australia and New Zealand.
Despite widespread security concerns by smartphone users, 82 per cent do not have any security products installed, a survey by research group NPD has found.
Trend Micro has uncovered evidence of a major targeted malware attack that has managed to infect over 1,400 computers in Russia and its former Soviet satellite states.
Facebook's new Timeline will make it even easier for criminals and others to mine the social network for personal information they can use to launch malicious attacks and steal passwords, a researcher said today.
The latest espionage-related hacking campaign detailed by security vendor Trend Micro is most notable for the country it does not implicate: China.
Microsoft on Thursday wrapped up its civil case against the still-unnamed controllers of the Rustock botnet and handed off the information gleaned during its investigation to the FBI.
Resistance from database administrators to follow the advice of IT security staff and patch databases because of the time involved is leaving a door open for hackers, according to one security expert.
Sign up now »
Comprehensive protection from your internet gateway to your mail and file servers, desktops, laptops, and mobile devices, fully integrated and centrally managed.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.