Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Five cyber spy technologies that cannot be stopped by going offline

Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well known to any teenager today. No software barriers can fully...

View Article


Unpatched OS X, iOS flaws allow password, token theft from keychain, apps

Six researchers from Indiana University Bloomington, Peking University and Georgia Tech have recently published a paper in which they detail the existence of critical security weaknesses in Apple’s OS...

View Article


LastPass users need to change their passwords immediately

An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless it is hacked. In...

View Article

Obama backs OPM director as agency sends questionable email notifications

Since the monumental data breaches at the Office of Personnel Management (OPM) were first announced, a variety of reactions have come from legislators, but now the loudest among them are the calls for...

View Article

How CISOs can create security KPIs and KRIs

If your information security function is like most, it develops copious amounts of data about the business’s security that it delivers on a regular basis. And typically it never gets read. “There’s a...

View Article


Nearly half of 1,000 Leading Websites Fail Online Security and Privacy...

Some 46% of leading global websites have been found vulnerable to existing online security threats, according to Online Trust Alliance’s (OTA) annual audit of nearly 1,000 sites including leading...

View Article

45% of ex-employees continue to have access to confidential corporate data

With the current situation experienced by the labor market, it is essential for companies to take steps in order to maintain their security in face of the movements which may occur in their workforces....

View Article

Security updates for OS X, iOS fix bucketload of serious bugs

Apple has released security updates for Safari, OS X Yosemite (and previous OS X versions), and iOS. The OS X update contains fixes for 77 vulnerabilities, many of which can be exploited by attackers...

View Article


China’s New Security Law is Retort for U.S. Sanctions Policy

In late June, China’s government (PRC) passed sweeping legislation that reinforces government controls over cyber space. Specifically, the law addressed strengthened management over the web, and...

View Article


Dyre infections surge, variants spread through Windows exploit

Dyre infections have surged and new variants of the banking Trojan are being spread through exploitation of a Microsoft Windows bug, CVE-2015-0057, which has a patch, two security firms have found....

View Article

Archuleta could not overcome loss of confidence following cyber thefts

(Drew Angerer/Getty Images) For Sen. Mark Warner it wasn’t the crime as much as the counter-punch that finished Katherine Archuleta. After five weeks of increasing heat over revelations about the...

View Article

Same-Password Curse: Users Hesitate to Strengthen Passwords, Yet Fear Hackers

Consumers are reluctant to protect their accounts with multiple strong passwords, yet they worry weak ones will leave them vulnerable to hackers, multiple studies show. Out of a lack of awareness or a...

View Article

Microsoft Security Updates July 2015

Microsoft releases a long list of updates to multiple technologies today with 14 Security Bulletins (MS15-058, MS15-065 – MS15-077) patching 58 vulnerabilities, and at least 47 of them reported through...

View Article


Understanding PCI compliance fines: Who is in charge of enforcing PCI?

If your business stores, processes, or transmits data from payment cards, then you are subject to the requirements of the PCI DSS. This set of security controls is designed to help merchants combat...

View Article

Federal personnel files still very vulnerable and ‘prime targets’ for...

An audit due out Friday found 3,000 “critical” and “high-risk” vulnerabilities in three key bureaus at the Interior Department, the agency hosting the hacked personnel files of 4.2 million federal...

View Article


Lack of digital talent adds to cybersecurity problems

A big problem exposed by a massive data breach at the Office of Personal Management (OPM) is the woeful state of the federal government’s cybersecurity. It’s not comforting when the Obama...

View Article

Drones and security: where are we heading?

Recently I had the opportunity to attend the Changellenge Cup Russia 2015 student project competition. I was on the panel of judges for one of the sections. But today we will not speak of the contest...

View Article


How to apply threat intelligence feeds to remediate threats

IT organizations are recognizing the value of threat intelligence feeds, and that’s good. Threat intelligence is a must-have for identifying malware and other threats that evade preventive security...

View Article

Security pros issue comments before Wassenaar Arrangement deadline

The call for comments on the Wassenaar Arrangement closed on Monday after multiple heavy-hitting tech experts and companies filed their responses, which included calls for amendments to the rules and...

View Article

Google Chrome update includes 43 security fixes

Google has released Chrome version 44.0.2403.89 for Windows, Mac, and Linux to address multiple vulnerabilities. Exploitation of one of these vulnerabilities may allow an attacker to take control of an...

View Article
Browsing all 2490 articles
Browse latest View live