Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

The portable secure desktop: tVolution Mini

At the RSA Conference 2015 Becrypt launched tVolution Mini. The device is smaller than a mobile phone, but has the power of a PC, and transforms a monitor or TV into a smart device for securely...

View Article


Cyber extortion: A growth industry

The prevailing wisdom in law enforcement has been that it is a bad idea to negotiate with extortionists. Cave to their demands and all you’re doing is encouraging more extortion. And you don’t even...

View Article


Russian hackers wield Flash, unpatched Windows zero-day flaws

A fresh #attack by a long-known hacking group suspected to be linked with Russia did little to mask its activity in an attack a week ago. The computer #security firm FireEye wrote on Saturday that the...

View Article

Radware launches hybrid cloud based WAF service

Cyber attacks remain a persistent threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web attack vectors, increasing in popularity....

View Article

EU accused of watering down General Data Protection Regulation

European Union data-protection reform proposals could undermine basic privacy rights globally, a growing chorus of critics say. More than 60 civil rights groups from all corners of the world including...

View Article


Microsoft moves to address customers’ concerns about cloud control and...

#microsoft is working on new features for its Office 365 #cloud service designed to give customers more control over their #data and more visibility into how it’s being accessed. The company will...

View Article

House Passes Cybersecurity Bill Despite Privacy Protests

CONGRESS IS HELLBENT on passing a cybersecurity bill that can stop the wave of hacker breaches hitting American corporations. And they’re not letting the protests of a few dozen privacy and civil...

View Article

Sony hackers targeted employees with fake Apple ID emails

Hackers probably gained access to Sony’s network last year after a series of #phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a...

View Article


The international effort to confront international cybercrime

Cybercriminals obviously do not respect international borders. So it should be equally obvious that the effort to defeat or even slow them down is going to take an international effort, involving both...

View Article


Flaw on eBay’s Magento platform lets hackers attack web stores

Those using Magento’s e-commerce platform should ensure they’re using its latest software, as attackers are increasingly exploiting a flaw patched two months ago, security companies warned. The...

View Article

How to calm your board’s nerves about cybersecurity

Keith Turpin has seen some dire mistakes made in front of boards of directors, especially when #cybersecurity is on the agenda.”I’ve seen people go into board meetings with a network diagram,” says the...

View Article

Don’t count on people to prevent data breaches

Your company has been breached and your executives are in denial. That is the phrase that came to mind the other day during breakfast at RSA with Intel’s #security organization where I overheard the...

View Article

SecureDoc Cloud removes security concerns related to cloud file sharing

WinMagic introduced at RSA Conference 2015 security software that encrypts and manages how files are shared via cloud file sharing services such as Dropbox or Box. SecureDoc Cloud leverages WinMagic’s...

View Article


Truth #1 – Security Isn’t Just About Things. It’s About People.

It shouldn’t come as a shock that in a recent CIO.com study on What Keeps CIOs Awake at Night, #security planning is listed as the lowest priority for budget cuts in 2015. Here’s why: it seems that...

View Article

Big Data and analytics are changing the cybersecurity landscape

Stealing media headlines with a new breach almost every week, cybersecurity has skyrocketed to the top of boardroom discussion agendas. Yet an average of 35 percent of all cyberattacks still go...

View Article


WordPress quickly patches second critical vulnerability

WordPress patched a second critical #vulnerability in its Web publishing platform on Monday, less than a week after fixing a similar problem.Administrators are advised to upgrade to WordPress version...

View Article

Click-fraud malware now used for Russian propaganda

#malware typically used artificially inflate advertising revenues is now being used to promote Russian propaganda on the Dailymotion video site, according to a report released today by Trustwave....

View Article


Threats on government networks remain undetected for 16 days

Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected – hiding in plain sight. The good news is that 86 percent...

View Article

RSA president questions government’s role in cybersecurity

The president of one of the world’s biggest computer #security vendors says he is skeptical that a stronger #government role in cyberdefense will abate the growing number of attacks. In an interview...

View Article

Google develops new defense against phishing

#google has developed a new extension for its Chrome browser that aims to stop people from falling prey to #phishing sites. The free Password Alert extension stores an encrypted version of a person’s...

View Article
Browsing all 2490 articles
Browse latest View live