Data Protection — News

Data-breach insurance caters to small businesses

By Tim Greene | 22 September, 2011 01:41

With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data.

Netflix deals with cloud security concerns

By Tim Greene | 22 September, 2011 00:37

As Netflix commits its future to streaming movies to customers, it relies almost exclusively on cloud services for its infrastructure, raising security concerns that require a new way of thinking, the company's cloud security architect says.

Facebook subscriptions: 5 warnings

By Kristin Burnham | 22 September, 2011 00:31 | 1 Comment

If you don't use it correctly, Facebook's new subscription feature can lead to a social networking mess: private posts and comments shown publicly, a cluttered news feed and spam.

McAfee Delivers Comprehensive Protection for Mobile Devices

By Tony Bradley | 21 September, 2011 22:31

Just when you were starting to get ahead of the curve when it comes to locking down the network and protecting PCs, everything went mobile. Not just laptops--but tablets, and smartphones that run unique operating systems and applications on completely different hardware. To help you combat the dramatic rise in mobile security threats, McAfee has developed Enterprise Mobility Management.

Adobe rushes out patch for Flash zero day

By Liam Tung | 22 September, 2011 08:24

Adobe’s security team is rushing to deploy a multiple operating system patch for a cross-site scripting Flash Player flaw that has reportedly been used in targeted attacks.

Open this malware or I'll sue you

By Tim Greene | 22 September, 2011 05:31

The latest social engineering trick to get victims to open malicious email attachments accuses them of being spammers and threatens to sue them if they don't stop.

Bigger isn't better when it comes to social engineering attacks

By Tim Greene | 22 September, 2011 03:57

When it comes to social engineering attacks, larger companies attract more of them, and when they are victimized it costs more per incident, according to a survey sponsored by Check Point.

Social engineering attacks costly for business

By Joan Goodchild | 22 September, 2011 00:52

Social engineering attacks are widespread, frequent and cost organizations thousands of dollars annually according to new research from security firm Check Point Software Technologies.

Hacker creates makes iOS look like OS X Lion

By Elizabeth Fish | 22 September, 2011 00:11

Do you happen to be one of those people that really love Mac OS X Lion? Or perhaps, on the other end of the spectrum, you feel Lion's a bit too much like iOS? Well, now it's more than just similar, because if you happen to have an iPhone or iPod Touch, you can now make sure that Lion never leaves your side, with a bit of clever hacking.

Review: One time password generators

By Enex Testlab | 21 September, 2011 08:09

We all know that administering the human factor in network security is a balancing act. On the one hand you do need to enforce policies to minimise basic weaknesses, especially lazy passwords (such as the ubiquitous “password”). On the other hand, you also need to manage the administrative impact of rigid policies - how many times can one person get it wrong!

Skype iPhone, iPod Touch app has security hole

By Eric Mack | 21 September, 2011 02:21

Skype is working to fix a security hole in its iOS app for the iPhone and iPod Touch that allows a hacker to steal a person's entire address book. The vulnerability, located in the app's chat message window, can be exploited with JavaScript code. It was pointed out by security researcher Phil Purviance of AppSec.

Data protection fears undermine corporate donation of IT

By Anh Nguyen | 21 September, 2011 00:34

Data protection concerns are preventing many UK companies from disposing of their working computers by sending them for reuse, a new survey from charity Computer Aid International has revealed.

DigiNotar: End of DigiNotar near as it files for bankruptcy

By Liam Tung | 21 September, 2011 07:17 | 1 Comment

Hacked Dutch certificate authority DigiNotar on Monday filed for bankruptcy, its US authentication company parent Vasco announced.

Kenneth van Wyk: Security failures could erode public trust in the Internet

By Kenneth van Wyk | 21 September, 2011 00:33

There's big trouble in the world of information security, and yet it seems that only a handful of us techies have noticed. What's the problem, you ask? Well, there are actually several problems, but they're all related to one very important issue: public trust. Let's take a look.

Cyberattackers hit Japanese defense giant with Trojan

By John E Dunn | 21 September, 2011 00:03

Japan's biggest defense contractor Mitsubishi Heavy has admitted that it was targeted by a major cyberattack last month in which at least 83 of its computers were infected with malware.

Jay Cline: Are medical-data breaches overreported?

By Jay Cline | 21 September, 2011 00:01

The Eli Lilly employee whose programming glitch exposed the e-mail addresses of almost 700 Prozac users to each other didn't know he was making history. Since that day in June 2001, hundreds more US healthcare organizations have reported medical-data breaches. As a result of those reports, federal and state health agencies have dealt out millions of dollars in fines, and the U.S. Department of Health and Human Services has launched a round of 150 audits. Meanwhile, a cottage industry of breach-notification service providers has arisen, and healthcare organizations can't find enough privacy talent to batten down the hatches.

Internet privacy: Cookies as a weapon

By Scott Bradner | 21 September, 2011 01:26

In November 2009 the European Parliament approved a directive on Internet privacy that, among other things, required user opt-in before websites could install cookies on the user's computer.

Microsoft fixes SSL 'kill switch' blooper

By Gregg Keizer | 20 September, 2011 05:31

Microsoft re-released an update today for Windows XP to correct a snafu that left users vulnerable to potential "man-in-the-middle" attacks for most of last week.

Former cybersecurity czar Clarke says smartphones, digital certificates create huge security problems

By Ellen Messmer | 20 September, 2011 03:31

Former White House cybersecurity adviser Richard Clarke, author of the book Cyber War, served 19 years in the Pentagon, intelligence community and State Department.

16 essential Android apps for IT pros

By Eric Geier | 19 September, 2011 20:32

There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Business Continuity Management Solutions

Automate business-continuity and disaster-recovery planning and enable crisis management in one solution.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.