Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Travel smart: Tips for staying secure on the road

Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your security best practices are coming...

View Article


Sniffing and tracking wearable tech and smartphones

Researchers at Context Information #security have demonstrated how easy it is to monitor and record #bluetooth Low Energy signals transmitted by many #mobile phones, wearable devices and iBeacons,...

View Article


Attackers use email spam to infect point-of-sale terminals with new malware

Cybercriminals are targeting employees who browse the Web or check their #email from point-of-sale (PoS) computers, a risky but unfortunately common practice. Researchers from #security firm FireEye...

View Article

Why insider threats are succeeding

Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves...

View Article

Webroot: Deliver collective threat intelligence in near real-time

“#threat intelligence is useless to most organizations if all it does is generate more alerts,” said Webroot CMO David Duncan is a recent Q&A. “Threat intelligence has to detect threats in real...

View Article


mSpy finally admits they`ve been hacked

After having first denied that they suffered a breach and had their customer’s #data stolen and leaked on the Dark Web, mobile spyware maker #mspy has finally admitted that the incident happened, but...

View Article

Breach detection: Five fatal flaws and how to avoid them

When the Sarbanes-Oxley Act of 2002 was passed, it fell on corporate security teams to translate its requirements into technical controls. That threw the IT Security function into the deep end of the...

View Article

Hybrid cloud startup Rubrik releases backup appliance, bags $41m more funding

#rubrik,which promises all-in-one approach to enterprise backup and recovery, announced its Converged #data Management platform in late March along with its initial funding. The technology aims to...

View Article


Researchers Exploit Patched Windows Group Policy Bug

  Researchers from Core #security were able to exploit a security vulnerability in #windows Group Policy — MS15-011 — that was patched in February by #microsoft. Nicolas Economou, a senior exploit...

View Article


How businesses can stem the flow of leaky data

The privacy and security of corporate data is at risk like never before. Not only are businesses faced with an ever-growing variety of security threats, from sophisticated, targeted attacks, to new...

View Article

Solving the cybersecurity challenges of smart cities

Backed by leading IT security researchers, companies and organizations, including IOActive, Kaspersky Lab, Bastille, and the #cloud Security Alliance, the global Securing Smart Cities initiative aims...

View Article

Android applications can secretly track location using Wi-Fi data

Many #android #applications collect information on Wi-Fi access points, which researchers contend can be used to figure out where a person is more than 90 percent of the time. The privacy implications...

View Article

Phishers register domain names, hammer traditional targets

The number of domain names used for #phishing reached an all-time high, according to a new report by the the Anti-Phishing Working Group (APWG). Many of these were registered by Chinese phishers, who...

View Article


How your employees put your organization at risk

#security is, of course, a major concern for most companies, but it’s often seen as an outside #threat. But it turns out that employees are one of the biggest security threats, and apparently most...

View Article

Complex security solutions are exposing companies to risk

Companies are putting their customers’ #data at #risk because IT teams do not have the expertise or time to deploy today’s complicated IT #security products, a new survey from Lieberman Software...

View Article


Uber to tweak privacy policy so it can better understand you and your friends

Uber Technologies is set to tweak its #privacy #policy so it can access a rider’s location when the Uber app is running in the background. The change in policy will also allow it to send special offers...

View Article

Facebook tests new "Security Check" tool to fend off account hijacking

Ever worried that someone else might access your Facebook account? Facebook helps with this – as well as Google, PayPal and plenty of other platforms, Facebook can send alerts any time there’s a new...

View Article


Security Firm Redefines APT: African Phishing Threat

A #security firm made headlines earlier this month when it boasted it had thwarted plans by organized Russian cyber criminals to launch an #attack against multiple US-based banks. But a closer look at...

View Article

Phishing Gang is Audacious Manipulator

Cybercriminals who specialize in phishing — or tricking people into giving up usernames and passwords at fake bank and ecommerce sites — aren’t generally considered the most sophisticated crooks, but...

View Article

Exposing the vulnerabilities in Oracle PeopleSoft applications

During his talk at the #hack in the Box conference, Alexey Tyurin, Head of the Oracle Security Department at ERPScan, spotlighted several vulnerabilities in Oracle PeopleSoft applications. Oracle is...

View Article
Browsing all 2490 articles
Browse latest View live