Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

New Zealand internet brought down by people trying to view naked pictures of...

Mo Farah has become the first British man to win the Great North Run since 1985 with a personal best time of one hour and one second. More than 15,000 people turned out to support campaigners who...

View Article


Hackers launch Apple ID phishing campaign playing on iCloud security worries

The hackers behind the Kelihos botnet are trying to capitalize on users’ increased awareness about the security of Apple online accounts through a new phishing campaign. According to security...

View Article


The Snowden effect: How it’s still denting business confidence in cloud security

Signs were that security was beginning to recede as an obstacle to cloud adoption. That was until Edward Snowden’s revelations about NSA’s PRISM data-mining activities.

View Article

Isn’t Apple a Leader in Security?

The iCloud hack has cast Apple in a poor security light. Yes, the company dropped the ball on this one, but it is a leader in many other ways.

View Article

Website of Israeli Think Tank Serves Data-Stealing Trojan

The official website of an important Israeli think tank has been compromised and abused to distribute a piece of malware, security firm Cyphort reported on Friday.

View Article


Unencrypted Laptop Thefts Expose Personal, Medical, Financial Data

‘The benefits of encryption have been known for some time, but companies just aren’t doing it,’ says SafeNet chief strategy officer Tsion Gonen.

View Article

Threat filtering: Strategizing serious threat detection

Standardized procedure on threat filtering isn’t working out so well; to avoid being a ‘target’ today’s organization needs an updated threat strategy.

View Article

Apple IDs Targeted in Phishing Scheme: Symantec

Researchers at Symantec spotted a phishing campaign targeting Apple IDs in the days after it was discovered a number of celebrities had their accounts compromised.

View Article


Helen Mirren ‘Insulted’ That Hackers Didn’t Try to Find Her Naked Selfies

In a radio interview, 66-year-old actress and preeminent foxy lady Dame Helen Mirren wondered why she, of all celebrities, wasn’t targeted in the celebrity photo hacking scandal that rocked Hollywood...

View Article


Home Depot confirms payment system attack

The home improvement retailer with more than $78 billion in sales said there’s no evidence that debit card PINs have been compromised. The attack rhymes with what Target experienced.

View Article

Home Depot Confirms Payment Card Data Breach

After days of speculation, Home Depot has confirmed it was victimized in data breach that compromised credit and debit cards at stores throughout the United States and Canada. According to the company,...

View Article

Kelihos Botnet Used for Apple ID Phishing

Spam emails claiming to report an iTunes Store purchase from a device that had not been tied to the Apple ID contain links to phishing websites that ask for Apple credentials. Researchers from Symantec...

View Article

Goodwill Data Breach Linked to Third-Party Vendor

Almost 900,000 payment cards appear to have been affected.

View Article


Vendor Fixes Vulnerabilities in Wireless Traffic Sensors

Sensys Networks, a company that provides integrated wireless traffic data systems, announced last week the availability of software updates that address security issues identified last year.

View Article

Did the FBI break the law taking down Silk Road?

Law enforcement located Silk Road by finding and accessing a server that wasn’t supposed to be public. When others do this the government calls it a felony.

View Article


RSA Unveils Security Operations Center Solution

RSA unveiled a new solution on Tuesday that is designed to help security teams detect and stop threats that could ultimately lead to an organizational data breach.

View Article

Adobe patches Flash Player

A dozen vulnerabilities mean new versions of Flash Player and AIR on all platforms, including iOS and Android.

View Article


Nothing Supports Winning Like Continuity: What Security Can Learn from the NFL

Building a Winning Security Program is a Process and It Takes Time to Implement All The Sieces.

View Article

Home Depot confirms months-long hack

Home Depot’s hack might be even bigger than Target’s was last year. In Target’s case, hackers slipped in for three weeks and grabbed 40 million debit and credit cards.

View Article

Compromised Web Server Exposes Personal Info at California State University,...

Sensitive information containing social security numbers among other data, has been extracted from a web server at California State University, East Bay by an unknown intruder in August, 2013. Even if...

View Article
Browsing all 2490 articles
Browse latest View live