Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Data breaches drive identity theft and fraud

Data breaches are affecting consumers nationwide and residents in and around Washington, D.C. are not immune to the consequences. According to a survey by Experian, 57 percent have been a victim of...

View Article


Password Security: Reality or Joke?

Cyber #security is a top concern in the IT industry today. In this series, we will look at various #threats to cyber security – and what steps businesses can take to meet those threats head on. Here,...

View Article


Is this the future of online security? Why uQontrol thinks its Qkey is different

US-based startup uQontrol has pre-launched what it claims is the world’s first ‘three-factor’ authentication token consumers can use to secure online shopping transactions and personal data from...

View Article

How open source can improve your software’s security

Let’s be blunt: your code is full of #security holes. Just as bad, your employees are careless with passwords and other ways of cracking into your data. Hence, while we may wring our hands over...

View Article

Congress moves quickly on cyberthreat information sharing

The U.S. Congress is moving forward quickly with legislation that would encourage private companies to share cyberthreat information with government agencies, despite concerns that two leading bills...

View Article


How secure is your Wi-Fi? 3 things small businesses need to know

If you don’t have a wireless network in your business, you might as well be in the dark ages – or that’s what your employees, customers and guests will tell you. You’d be hard-pressed to find a cafe,...

View Article

OpenSSL Patch to Plug Severe Security Holes

The world is about to get another reminder about just how much of the Internet runs on technology maintained by a handful of coders working on a shoestring budget. #openssl — the software used by...

View Article

Digital certificates and encryption keys a growing stress for UK organisations

UK IT professionals are starting to worry about encryption keys and #certificates. Many don’t know how many their organisations possess or even where some are stored. All of them think these assets are...

View Article


“Your location has been shared 5398 times”– Do we need a privacy assistant on...

Do you know how much information your smartphone is giving away to app makers and advertisers? Lots of people have “no idea,” according to a computer scientist at Carnegie Mellon University, who...

View Article


Why you should be spending more on security

Many CIOs endanger their companies simply by not spending enough on #security. That may seem odd to posit, given that a recent Pricewaterhouse Coopers survey found that businesses now spend a higher...

View Article

What`s complicating your security readiness?

The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment that’s challenging for...

View Article

Smart home hacking is easier than you think

Last March, a very satisfied user of the Honeywell Wi-Fi Thermostat left a product review on Amazon.com that shed some light on an unexpected benefit of the smart home – revenge. The reviewer wrote...

View Article

Chinese government linked to largest DDoS attack in GitHub history

On March 26, 2015, a very well-coordinated distributed denial of service (#ddos) #attack was waged on GitHub, the heir apparent to the now-closing Google Code. GitHub characterized this as the largest...

View Article


Want to secure your social info? Facebook shows you how

Facebook today launched 11 interactive guides and how-tos to help users secure their #social information. The new guides, which can be found on the Facebook Privacy Basics site, are designed to help...

View Article

Google cracks down on ad-injecting Chrome extensions

Google has identified and disabled 192 Chrome browser extensions that injected rogue ads into Web pages opened by users without being upfront about it. The company will scan for similar policy...

View Article


Cyberwar heats up in the Middle East

Two new #malware campaigns have been spotted in the Middle East, according to reports released this week, one targeting energy companies and the other going after political targets in Israel and...

View Article

It’s time to research new ways to fight DDoS attacks

Almost 1-in-5 (18-percent) of businesses experienced a distributed denial-of-service #attack within a year-long timeframe, according to the Global IT #security Risks Survey 2014—Distributed Denial of...

View Article


What happens to data after a breach?

Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, landing in five different...

View Article

A guide to monetizing risks for security spending decisions

#security executives routinely have to make tough decisions about which risks to mitigate, which to avoid or transfer and which to accept.Your security budget has its limits. You have a finite amount...

View Article

IoT devices facilitate robbery, stalking and cybercrime

The foundation of the Internet of Things (#iot) – the devices themselves plus their associated mobile applications and cloud services – are often not designed with #data #security or #privacy in mind,...

View Article
Browsing all 2490 articles
Browse latest View live