Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.
American and British spy agencies apparently believe there are real-life terrorists lurking among the elves, gnomes and the trolls of online gaming worlds.
An intermediate certificate authority (CA) registered to the French Ministry of Finance issued rogue certificates for several Google domains without authorization.
The Dutch Minister of the Interior and Kingdom Relations will question the U.S. Embassy over the purpose of its rooftop antennas, the minister wrote in a letter to the House of Representatives Monday.
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
The first photograph shows a slightly overweight young man standing in front of a white Porsche Cayenne, cigarette in hand, expression uneasy. In a second he appears to be reading a charge sheet as a masked military policeman in black stands guard in the background.
Asia-Pacific regional privacy authorities are weighing the merits of legislative 'white lists' to facilitate cross-border action as they utilise a growing number of “significant enforcement actions” using numerous “regulatory tools” to enforce privacy law, members of the Asia Pacific Privacy Authorities (APPA) Forum confirmed at the organisation's recent meeting in Sydney.
'Shadow IT' – the growing range of servers and applications that users can purchase and use without any involvement from the IT organisation – is compromising organisational security, an analysis warns. But rogue end users aren't the only ones to blame: IT professionals share the blame, a recent survey has shown even as IT pros are labelled 'innovation killers' and high rates of employments for CISOs mean the industry is suffering a shortage of those who could help better manage such risks.
Australian privacy-enforcement authorities did not receive any complaints about the use of personally controlled electronic healthcare records (PCEHR) during the first year of their use, new figures confirm.
Eight top tech companies in the U.S. have asked governments around the world to reform surveillance laws and practices, and asked the U.S. to take the lead.
The UK public sector is poorly equipped to combat fraud, with civil servants not being given the necessary training to help detect the estimated £20.6 billion lost every to fraud, says big data analytics firm SAS.
On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline.
Natwest has been targeted in a cyber attack which prevented customers from accessing its website.
The U.S. Defense Department may have found a new way to scan millions of lines of software code for vulnerabilities, namely by turning the practice into a set of video games and puzzles and have volunteers do the work.
The maker of a popular flashlight app for Android phones has agreed to settle charges brought by the Federal Trade Commission that it left consumers in the dark about its data-sharing practices.
Apple is taking a closer look at shoppers in its retail stores, under a new program that will push product-related information to their mobile devices using its iBeacon trackers.
The National Security Agency on Friday cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.
The U.S. National Security Agency has been spying on Italian communications from installations on the roof of the U.S. Embassy in Rome and the country's consulate in Milan and even mounted an operation to capture information from inside the Italian embassy in Washington, D.C., the Italian weekly magazine L'Espresso claimed Friday.
Microsoft isn't happy, and their top lawyer had plenty to say about protecting customer information this week in a blog post that announced the company's efforts to implement wide-reaching encryption.
Thirteen people, including the creator of Blackhole, a popular exploit tool used to infect computers with malware, were arrested and charged in Russia with creating and participating in a criminal organization.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.