- Hacker-built drone can hunt, hijack other drones
- Malware still running rings around security tools, eThreatz testing finds
- 2 million stolen login credentials discovered for Facebook, Google, LinkedIn, Twitter, other sites
- Conventional insurance may not cover cyber security breaches: Centre for Internet Safety
- Botnet snatches 2 million logins for Facebook, ADP payroll processor and other sites
internet in pictures
Apple is taking a closer look at shoppers in its retail stores, under a new program that will push product-related information to their mobile devices using its iBeacon trackers.
The U.S. National Security Agency has been spying on Italian communications from installations on the roof of the U.S. Embassy in Rome and the country's consulate in Milan and even mounted an operation to capture information from inside the Italian embassy in Washington, D.C., the Italian weekly magazine L'Espresso claimed Friday.
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.
Anonymous members, charged with a distributed denial-of-service attack on PayPal, entered a plea Thursday that could see some of them walk free at sentencing next December.
The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security.
Your email address is like your home address: Never give it out unless absolutely necessary.
We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
As everyone knows, Cloud provider, Nirvanix, recently fell apart, declaring bankruptcy and leaving its customers in the lurch. Nirvanix gave enterprises less than a month to move their data to a new home. To avoid the fate of those customers, follow these best practices for safely moving data in and out of the Cloud.
And it was all going so well. As vendors began to build more comprehensive cloud-based product roadmaps, Middle Eastern users were beginning to see just how cloud services can streamline their businesses. According to a Gartner report from earlier in the year, cloud adoption was due to grow monumentally in the region up to 2016. This was largely due to issues surrounding security and compliance being ironed out.
Edward Snowden's revelations about the U.S. government's data collection program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market to overseas rivals.
Whitepapers about internet
In July 2013, the database breach in the WikiLeaks case led president Obama to sign an executive order intended to address the insider threat. Among other things, it created an inter-agency task force and urged federal employees to observe their coworkers and flag questionable behaviour or circumstances. The implications of this incident go beyond the risks of trusted employees going rogue. Download report.
Sign up now »
Clearswift SECURE Email Gateway is an effective and resilient email gateway for 50 to 50,000 users.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.