Data Protection — News

Hack Your Way Into Facebook's New Timeline Feature

By David Daw | 23 September, 2011 12:10 | 10 Comments

Most users will have to wait a few weeks before they get to see Facebook's most drastic changes to the service since the company was founded, but you can use a developers workaround to gain access to the Timeline feature right now.

Mechatronic Security Robot Is Remarkably Formidable

By Albert Filice | 23 September, 2011 02:18

I’m constantly amazed by the creativity that goes into the random things I find on the Internets, and this bad-ass robot built by the Beatty Family is no exception. This isn’t your ordinary security bot, no sir; rather, it's an armored beast weighing in at 45 pounds that can defend itself with a mounted turret capable of firing 1,000 plastic or metal pellets a minute.

Patch Adobe Flash to Protect against Zero-Day Exploit

By Tony Bradley | 23 September, 2011 00:20

Adobe issued a critical update today for its Flash Player software. The patch fixes six security vulnerabilities, at least one of which is a zero-day vulnerability being actively exploited in the wild.

Facebook users offered app to scan for malicious links

By John E Dunn | 23 September, 2011 00:18

Facebook users worried about the risk of clicking on malicious links while using the social networking service are being offered a new app web that filters friend from foe.

Android devices exposed: 7 ways to thwart hackers

By Bill Snyder | 22 September, 2011 11:57

There's a new report out highlighting a huge spike in threats against Google's Android platform. It's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab.

Data-breach insurance caters to small businesses

By Tim Greene | 22 September, 2011 01:41

With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data.

Netflix deals with cloud security concerns

By Tim Greene | 22 September, 2011 00:37

As Netflix commits its future to streaming movies to customers, it relies almost exclusively on cloud services for its infrastructure, raising security concerns that require a new way of thinking, the company's cloud security architect says.

Facebook subscriptions: 5 warnings

By Kristin Burnham | 22 September, 2011 00:31 | 1 Comment

If you don't use it correctly, Facebook's new subscription feature can lead to a social networking mess: private posts and comments shown publicly, a cluttered news feed and spam.

McAfee Delivers Comprehensive Protection for Mobile Devices

By Tony Bradley | 21 September, 2011 22:31

Just when you were starting to get ahead of the curve when it comes to locking down the network and protecting PCs, everything went mobile. Not just laptops--but tablets, and smartphones that run unique operating systems and applications on completely different hardware. To help you combat the dramatic rise in mobile security threats, McAfee has developed Enterprise Mobility Management.

Adobe rushes out patch for Flash zero day

By Liam Tung | 22 September, 2011 08:24

Adobe’s security team is rushing to deploy a multiple operating system patch for a cross-site scripting Flash Player flaw that has reportedly been used in targeted attacks.

Open this malware or I'll sue you

By Tim Greene | 22 September, 2011 05:31

The latest social engineering trick to get victims to open malicious email attachments accuses them of being spammers and threatens to sue them if they don't stop.

Bigger isn't better when it comes to social engineering attacks

By Tim Greene | 22 September, 2011 03:57

When it comes to social engineering attacks, larger companies attract more of them, and when they are victimized it costs more per incident, according to a survey sponsored by Check Point.

Social engineering attacks costly for business

By Joan Goodchild | 22 September, 2011 00:52

Social engineering attacks are widespread, frequent and cost organizations thousands of dollars annually according to new research from security firm Check Point Software Technologies.

Hacker creates makes iOS look like OS X Lion

By Elizabeth Fish | 22 September, 2011 00:11

Do you happen to be one of those people that really love Mac OS X Lion? Or perhaps, on the other end of the spectrum, you feel Lion's a bit too much like iOS? Well, now it's more than just similar, because if you happen to have an iPhone or iPod Touch, you can now make sure that Lion never leaves your side, with a bit of clever hacking.

Review: One time password generators

By Enex Testlab | 21 September, 2011 08:09

We all know that administering the human factor in network security is a balancing act. On the one hand you do need to enforce policies to minimise basic weaknesses, especially lazy passwords (such as the ubiquitous “password”). On the other hand, you also need to manage the administrative impact of rigid policies - how many times can one person get it wrong!

Skype iPhone, iPod Touch app has security hole

By Eric Mack | 21 September, 2011 02:21

Skype is working to fix a security hole in its iOS app for the iPhone and iPod Touch that allows a hacker to steal a person's entire address book. The vulnerability, located in the app's chat message window, can be exploited with JavaScript code. It was pointed out by security researcher Phil Purviance of AppSec.

Data protection fears undermine corporate donation of IT

By Anh Nguyen | 21 September, 2011 00:34

Data protection concerns are preventing many UK companies from disposing of their working computers by sending them for reuse, a new survey from charity Computer Aid International has revealed.

DigiNotar: End of DigiNotar near as it files for bankruptcy

By Liam Tung | 21 September, 2011 07:17 | 1 Comment

Hacked Dutch certificate authority DigiNotar on Monday filed for bankruptcy, its US authentication company parent Vasco announced.

Kenneth van Wyk: Security failures could erode public trust in the Internet

By Kenneth van Wyk | 21 September, 2011 00:33

There's big trouble in the world of information security, and yet it seems that only a handful of us techies have noticed. What's the problem, you ask? Well, there are actually several problems, but they're all related to one very important issue: public trust. Let's take a look.

Cyberattackers hit Japanese defense giant with Trojan

By John E Dunn | 21 September, 2011 00:03

Japan's biggest defense contractor Mitsubishi Heavy has admitted that it was targeted by a major cyberattack last month in which at least 83 of its computers were infected with malware.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Endpoint Management Solutions

Endpoint Security Management

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.