Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Organizations lack control over mobile workspaces

More than 64 percent of respondents to a SANS survey said a majority of their #mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent said sufficient...

View Article


Japan’s Alsok to launch warning system for unwelcome drones

Burglar alarms could soon incorporate #drone-detection #technology if a new service from a Japanese #security company is anything to judge by.Tokyo-based Sohgo Security Services, also known as Alsok,...

View Article


APT group`s malware retrieved C&C IP addresses from Microsoft`s TechNet portal

A China-based APT group has been using #microsoft’s TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE #malware, FireEye researchers have revealed. “While other...

View Article

China-based hackers used Microsoft’s TechNet for attacks

#microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to #security vendor FireEye. The group, which FireEye calls...

View Article

IDG Contributor Network: Re-thinking doctor-patient communications in the...

Within business, #healthcare and our social lives, #email has become a preferred form of communication. Somewhere between the ubiquity of access and habits developed over years of use, we face the...

View Article


Security researcher’s hack caused airplane to climb, FBI asserts

The FBI contends a cybersecurity researcher said he caused an airplane’s engine to climb after hacking its software, according to a court document. The researcher, Chris Roberts, was questioned by the...

View Article

Researchers Disclose Further Vulnerabilities in Google App Engine

A Polish research group claims there are still several outstanding vulnerabilities in Google App Engines for Java, including three complete Java sandbox escapes. After three weeks of radio silence from...

View Article

5 tips to comply with the new PCI requirements

At the end of June, merchants that accept payment cards have five new #security requirements to comply with — and significant fines and other costs if they don’t. The new rules are part of the new...

View Article


UK design firm shows off ‘Shadowire’– is this the answer to USB security woes?

Famous UK house of invention Cambridge Consultants has this week showcased a clever new #technology that can be used to transfer encrypted files between computers without the drawbacks of insecure #usb...

View Article


Researcher invents fake password technology to confuse hackers

A team of researchers has developed a system that makes it much harder for hackers to obtain usable passwords from a leaked database, which could help blunt the damage from data breaches. Called...

View Article

Hackers breached subsea cable operator Pacnet`s corporate IT network

Global telecommunications service provider and fibre optic subsea cable operator Pacnet has suffered a breach: unknown hackers have gained access to its corporate IT network last month. It’s...

View Article

St. Louis Federal Reserve forces password change after DNS attack

A branch of the U.S.’s central bank is forcing a #password reset after a cyberattack briefly redirected visitors to parts of its website to bogus Web pages. The Federal Reserve of St. Louis found on...

View Article

New Critical Encryption Bug Affects Thousands of Sites

A new and critical #vulnerability uncovered by #security researchers would allow an #attacker to intercept and decrypt secured communications exchanged between users and thousands of web sites and mail...

View Article


US proposes tighter export rules for computer security tools

The U.S. Commerce Department has proposed tighter export rules for computer #security tools, a potentially controversial revision to an international agreement aimed at controlling weapons #technology....

View Article

Personal info of 1.1M customers stolen in CareFirst breach

CareFirst, a Blue Cross Blue Shield plan, has announced that they have suffered a #breach in which the attackers gained access to one of their databases. “Evidence suggests the attackers could have...

View Article


New protocol from Guardtime hopes to unseat RSA for authentication, digital...

#data integrity vendor Guardtime hopes its newly announced protocol will replace RSA for the purposes of authentication and digital signatures, touting it as easier to manage and less vulnerable to...

View Article

Account recovery via secret questions is a bad idea

Secret questions offer far lower #security than user-chosen passwords, and should never be used as the only way to reclaim access to a lost account, #google researchers have confirmed. After having...

View Article


Secom security drone follows, photographs intruders

If you think #drones are more than slightly creepy, wait until you meet one that will autonomously follow you and record video.Japanese #security company Secom is launching a drone that will...

View Article

Freelance hacking site vows to clean up dodgy listings

Charles Tendell is trying to repair a reputation problem for his website, Hacker’s List.The site debuted in November and quickly drew high-profile attention, including a front-page story in the New...

View Article

Android’s reset function fails to delete data from Samsung and HTC smartphones

The built-in factory reset on #android smartphones is so poorly implemented on some popular models it should never be relied on to erase sensitive #data, the Asset Disposal & Information #security...

View Article
Browsing all 2490 articles
Browse latest View live