- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- How to keep your smartphone (and its data) secure
- Espionage outpacing financial crime as better reporting improves security picture: Verizon
- Today's Approach to Security is Broken
- Microsoft confirms HTTP Strict Transport Security for IE 12
Facebook in pictures
When the OpenSSL Heartbleed bug surfaced earlier in April, many people were shocked to discover that one of the most critical pieces of online infrastructure was so poorly supported.
Reeling from the Heartbleed security fiasco, major IT vendors including Microsoft, IBM, Intel, Google and Cisco are backing a Linux Foundation initiative designed to boost open source projects considered critical to the industry.
Despite pressure from the Federal Trade Commission, Facebook is unlikely to leave WhatsApp's stricter privacy policies intact, once government regulators approve the $19 billion acquisition, privacy experts say.
The U.S. Federal Trade Commission on Thursday cleared a path for Facebook's acquisition of WhatsApp to proceed, though it called on both companies to be mindful of their data collection policies.
LastPass has released a new tool to show you which of your supposedly secure online accounts are at risk of being compromised, as the Heartbleed fallout continues with numerous major sites admitting to being hit by the devastating bug.
Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.
Your Android phone not only enables you to do nearly everything online, but also allows you to carry your life in your pocket. Although having all that information in a single location and always on hand may be especially convenient, it makes for an appealing target to thieves and hackers. But you're not defenseless: You can take a number of steps and precautions to ensure that your stuff stays safe.
Securing your PC against the malicious wilds of the Web isn't as simple as just keeping your antivirus software of choice up-to-date. In fact, the pervasiveness of security software has forced the bad guys to turn to increasingly clever tricks in their quest to "pwn" your PC.
We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
Free programs will take you only so far in protecting against viruses, malware, ransomware, especially now that phones and tablets are as commonly targeted as PCs. Many suites promise to protect you, but only a few offer comprehensive security with minimal hassle.
A day after The Washington Post and Guardianpublished bombshell revelations that America's biggest tech companies are allowing the U.S. government to constantly monitor highly personal data contained in their servers, the facts remain fuzzy and somewhat fluid--and the statements of the parties involved don't add up.
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
Confession time: I'm an inveterate social media junkie. From Facebook to Instagram to Diaspora, whenever a new communication platform rolls around--or comes back around--I'm ready to leap aboard.
Sign up now »
Get powerful mobile security capabilities, and protect the data the various mobile devices inside your organization.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.