Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Android M will give app users a lot better control over their data privacy

#google unveiled the developer preview of the next version of #android at its annual I/O developer conference last week, and there’s a big difference from previous versions in how it will handle user...

View Article


IoT devices entering enterprises, opening company networks to attacks

OpenDNS released The 2015 Internet of Things in the Enterprise Report, a worldwide data-driven security assessment of Internet of Things (IoT) devices and infrastructure found in businesses. Using...

View Article


Data Breach Costs Hit Record $3.8 Million Each, and Counting

The average cost for each lost or stolen record containing sensitive and confidential information increased from $145 in 2014 to $154 in this year’s study. Some 47% of all breaches were caused by...

View Article

Cloud-based solutions that protect against zero day attacks

BAE Systems Applied Intelligence announced at Infosecurity Europe 2015 that it is bringing cloud-based cyber security to commercial organisations in Europe for the first time.  The company is...

View Article

Shadow IT is prevalent in government agencies

Despite clear benefits of #cloud services – greater collaboration, agility, and cost savings – federal agencies are slow to migrate to the cloud due to #security concerns. As a result, employees adopt...

View Article


Businesses ill-prepared to defend against dramatic rise in zero day attacks

Businesses have been diligently working to defend against attacks and exploits for years. The problem is that much of the conventional wisdom about #security is reactive and most of the security tools...

View Article

Better data loss prevention tools for OneDrive for Business

When most of us think about #data #loss in the enterprise, we think about deliberate acts of criminal theft. The pilfering of account information from the United States Internal Revenue Service by a...

View Article

70% of breaches are detected by a third-party

46 percent of organizations that have suffered a data breach took more than four months to detect a problem, and more than three months to mitigate the risk. Worryingly, the survey of 1,000 IT...

View Article


China Overtakes US as Top Source of Distributed Denial of Service Attacks

More Distributed Denial of Service (#ddos) #attacks originated in China than in any other country, followed by Germany and the United States, according to the Q1 2015 State of the Internet – #security...

View Article


Logjam TLS vulnerability is academic, not catastrophic

Logjam is a new weakness in TLS that allows an attacker to downgrade the cryptography on a connection; it is similar to another recent #attack on TLS calledFREAK. To help us understand why widespread...

View Article

Most vulnerabilities on enterprise networks are two years old

The NTT Innovation Institute and NTT Group security combined an analysis of over six billion attacks observed in 2014 with an interactive data review and ongoing daily global threat visualization....

View Article

Security News This Week: Macs Can Get Hacked, and So Can Personal Federal Data

So many hacks, so few days in the week to write alarming stories about every one. Every weekend, WIRED #security rounds up the security #vulnerabilities and #privacy updates that didn’t quite rise to...

View Article

OPM Hack May Have Exposed Security Clearance Data

Twenty-four hours after unnamed White House officials said the Office of Personnel Management (OPM) #data #breach was linked to China, one #security company has connected the intrusion to the massive...

View Article


Facebook, Twitter represent bulk of blocked traffic on corporate networks

CIOs and IT managers are in many ways fighting a losing battle when it comes to blocking employee access to #social media services and other websites on corporate networks. Every day, employee make an...

View Article

Swift adoption of cloud and mobile drives insider threats

Bitglass surveyed 500 IT and #security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months. As more #data leaves the network via #cloud apps and...

View Article


VMware patches virtual machine escape issue on Windows

VMware has released security updates for several of its virtualization products in order to address critical vulnerabilities that could allow attackers to break out of #virtual machines and execute...

View Article

The Duqu attack on Kaspersky Lab is a shocking assault on the whole security...

Russian security firm #kaspersky Lab today hosted a dramatic press conference that all but accused the US of carrying out a successful cyber-attack on the company using an obscure but extremely...

View Article


Private security clearance info accessed in second OPM breach

Hackers tied to China may have accessed private security clearance information in what is being seen as a separate hack of the Office of Personnel Management (OPM) from the one that the agency revealed...

View Article

With payroll in arrears, online antivirus seller shuts doors

The sudden #shutdown of a computer tech support #call center has left some of its employees wondering if they will be paid. #ez tech support, based in Portland, Oregon, took calls from people who had...

View Article

Uber petition site pulled after hacker redirected visitors to rival

A hacker has forced Uber to take its online petition site down after exploiting a vote-spamming flaw which he said was “super easy for the developer of the website to prevent”. The hacker, going by...

View Article
Browsing all 2490 articles
Browse latest View live