Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Stunning model Joy Corrigan’s anger at nude pics being hacked before Jennifer...

Before Jennifer Lawrence’s nude pics were hacked, model Joy says her private photographs were stolen despite her raising concerns with Apple Glamour model Joy Corrigan has hit out at Apple after she...

View Article


Treasury risk manager leaps from Microsoft Access to Azure cloud

New Zealand Treasury’s Debt Management Office is a risk-management agency, but for years it relied on a risky IT environment.

View Article


6 Ways to Protect your Internet of Things from Hackers – community blog from...

Everything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays , tooth brushes , and more. A study by HP shows that 70...

View Article

Microsoft and Yahoo spar with U.S. government [Government IT News]

The big online and tech companies suffer from an interesting conflict: the government is both customer and the one carrying the biggest stick in the privacy battle. Unless there’s a major policy...

View Article

Five Eyes Treasure Map surveys German telco networks: report

Documents released by former NSA contractor Edward Snowden have revealed that a global internet mapping program dubbed Treasure Map has been spying on German telcos’ networks, despite US government...

View Article


WikiLeaks names NSW Police as FinFisher malware customer

The NSW Police and Singapore’s PCS Security Pte Ltd have been named as buyers of FinFischer malware, along with the intelligence arms of the Hungarian, Italian, and Bosnian governments.

View Article

Here’s What Hackers Can Do With Your CRM Data

It is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. CRM data may not seem to be the low hanging fruit of, say, a nationwide sweep of...

View Article

Liberty Reserve CTO Pleads Guilty to Money Laundering Charges

The former chief technology officer of one of the world’s most popular digital currency services has pleaded guilty to money laundering charges in federal court.

View Article


Will Technology Replace Security Analysts?

Recently, at a round table discussion, I heard someone make the statement, “In five years, there will be no more security analysts. They will be replaced by technology.” This is not the first time I...

View Article


WikiLeaks Names Customers of Controversial Surveillance Software

WikiLeaks today released new information on FinFisher, and a list of countries that have acquired licenses for the controversial suite of IT surveillance software.

View Article

Focus of Endpoint Breaches Will Shift to Mobile Devices by 2017: Gartner

At the Gartner Security and Risk Management Summit taking place in the United Arab Emirates, the IT research and advisory firm’s analysts are discussing the latest mobile security trends and threats.

View Article

Google: Global government data demands up 150 percent in five years

Demands for user data requests have more than doubled in five years, with the U.S. government leading pack in the global intelligence gathering race.

View Article

Docs: Obama Admin Knew HealthCare.gov Was Vulnerable To Malicioius Attacks...

Top Obama administration officials knew just how vulnerable HealthCare.gov was to malicious security breaches when it launched, leaving data at risk to hackers that have already breached the website at...

View Article


Hacker exploits printer Web interface to install, run Doom

Doom on a printer’s menu screen! Personally, we can’t wait until someone makes Descent playable on a toaster. On Friday, a hacker presenting at the 44CON Information Security Conference in London...

View Article

Google Transparency Report Shows Jump in Data Requests

Demands for Google users’ data have shot up 150 percent worldwide since 2009, according to the latest edition of Google’s Transparency report. According to Google, there has been a 250 percent increase...

View Article


NSA Plans To Map Entire Internet

The National Security Agency is hacking into corporate servers and attacking global ISPs as part of its effort to map off the entire Internet according to a report Sunday in Der Spiegel, a German...

View Article

Internet-enabled objects add to security risks

The Internet of Things will create additional security risks for businesses and consumers, according to network security experts at the APNIC 38 conference in Brisbane. Eric Vyncke, an engineer with...

View Article


Apple updates OS X Mavericks, Safari and other products

In addition to Mavericks 10.9.5, the company released updates for earlier OS X versions, multiple new versions of Safari, and patches for Xcode, OS X Server and Apple TV.

View Article

OWASP Releases New Testing Guide

The Open Web Application Security Project (OWASP) announced on Wednesday the availability of version 4 of the OWASP Testing Guide.

View Article

Hacker claims to have infiltrated

Last week, a hacker with the Twitter tag @anonymousglobo posted links to what is allegedly the user names and passwords to the database of the town of Chester government website, as well as websites...

View Article
Browsing all 2490 articles
Browse latest View live