Data Protection — News
Virtualisation - in particular Trend Micro's close alliance with VMware - is bringing about a strategic shift in Trend's anti-malware business as its products become designed for use with VMware's vShield technology.
When you leave your flat, do you leave the door wide open with your jewelry and valuables on the coffee table? When you visit a popular coffee shop, do you leave your iPad and smartphone on the table and go off shopping for an hour or two?
Hackers have obtained a digital certificate good for any Google website from a Dutch certificate provider, a security researcher said today.
The U.S. Federal Communications Commission should take swift action to rule against the Bay Area Rapid Transit (BART) District's recent decision to shut down mobile phone service during a planned protest, several digital rights groups said Monday.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
Facebook recently rolled out a number of changes to the social networking site. One of the changes eliminates the concept of Facebook Places, but instead incorporates location-aware updates at virtually every level of Facebook. You might want to think twice, though, before broadcasting your location to the anonymous masses online.
A new Windows worm is working its way through company networks by taking advantage of weak passwords, security researchers said over the weekend.
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy and data.
U.K. police said Thursday a 22-year-old student has been charged in connection with participating in distributed denial-of-service attacks (DDOS) with the hacking collective Anonymous.
Four major credit card companies are working with the Isis mobile wallet venture to install mobile payment security applications on upcoming NFC-ready smartphones in the U.S.
This past week in security news was highlighted by a hacking revelation out of China, bad news for banks, good news for Sony gaming customers and a curious email that might have been at the heart of the big RSA data breach.
As Hurricane Irene barrels toward the eastern seaboard, the U.S. Department of Homeland Security is warning government agencies and private companies to be on the lookout for storm-related phishing attacks and other malicious cyberactivity.
"I forward this file to you for review. Please open and view it."
Targeted attacks are penetrating standard levels of security controls and causing significant business damage to enterprises that do not evolve their security controls, according to Gartner vice president and analyst, John Pescatore.
Big business and government need to invest in data forensics and skills if they intend on fending off targeted attacks, according to analyst firm Gartner.
The hacking group Anonymous has waged a full-on war on BART, the San Francisco subway system, over cellular shutdowns to stifle protests. Following two demonstrations that led to temporary station closures, hacking and posting personal information of BART police officers, Anonymous has now posted naked photos of BART spokesman Linton Johnson.
AusCERT general manager Graham Ingram has questioned the wisdom of Australia's National E-Health Strategy plans to make medical records available online, pointing to the difficulty of securing end-users' computers.
Cybercriminals increasingly are targeting business bank accounts to set up fake money transfers. But the good news is, banks seem to be getting better at stopping some fraudulent transactions before stolen funds leave the institution.
A dangerous piece of malicious code responsible for stealing money from online bank accounts is being updated with new functions after its source code was leaked earlier this year, according to security researchers.
Face-recognition technology and the near-universal adoption of social networking tools by teenagers could have already made future covert police and intelligence operations difficult, if not impossible, according former Australian Federal Police commissioner Mick Keelty.
Sign up now »
Reduce complexity and increase trust for public cloud service providers and their customers.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.