Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Three strategies for the new era of enterprise cybersecurity

The pace of change for Information Technology is challenging established notions of “What is IT?” and “What is Information Security in the modern age?” For one example, the “new” data center...

View Article


Will Security Match Up to The World Cup’s Cyber Threats?

The World Cup kicked off last Thursday, marking the beginning point of more than a month of futbol hysteria. The World Cup is the most watched event on the planet and the runner up isn’t even close....

View Article


Will full encryption sideline Google’s targeted ads?

Mining personal data to deliver targeted ads is the lifeblood of Google’s business — and of many other online firms.

View Article

Identifying Mobile Blind Spots

Until We Know What is Occurring on Devices, We Cannot Determine if Our Controls are Effective at Managing Risk…

View Article

Zbot Variant Poorly Detected by AV Engines

A security researcher encountered a threat sample identified as Zbot by five of the 52 engines availableon VirusTotal.Zbot, also known as Zeus, is a Trojan designed for data stealing purposes, focusing...

View Article


Fake ‏Google Play App Steals Private Information

A new threat for Android devices emerges, as researchers have found a Google Play clone that can send text messages, signature certificates, and bank passwords to Gmail accounts. FireEye researchers...

View Article

Europe’s highest court to rule on Facebook NSA data-sharing case

The NSA’s mass surveillance program could change Europe and the US’s 2000 Safe Harbour agreement.

View Article

Europe’s highest court to rule on Facebook privacy case

The NSA’s mass surveillance program could change Europe and the US’s 2000 Safe Harbour agreement.

View Article


CloudFlare acquires VPN service CryptoSeal, shuts it down

CloudFlare acquires VPN startup, closes it down but keeps hold of its Trusted Computing technology.

View Article


Authentication Tokens Found in App Source Codes by the Thousands

Custom crawler PlayDrone was used by researchers to download and decompile over 880,000 free programs to find thousands of secret tokens that authenticate service to service communication embedded in...

View Article

7 Million+ Cards Likely to Have Been Stolen in P.F. Chang’s Breach

The computation took into consideration the possibility that the companys restaurants had in fact been leaking credit card data for a period of nine months, since September 2013.According to...

View Article

LinkedIn called out on slow implementation of default SSL

LinkedIn said it is making progress implementing default encryption of data exchanged with its users after a security company alleged some users are still at risk of account takeovers.

View Article

Simplocker Changes Attack Vectors

Despite the simplicity publicized by various security researchers and the fact that there are solutions to reverse its malicious activity, Simplocker has seen an increase in distribution. Robert...

View Article


Cyber attack caused realtor.com and Top Producer outages: Move

A “distributed denial of service attack” bombarded realtor.com and other websites operated by Move Inc. with “massive amounts of traffic” causing the extended outages experienced Wednesday, Move said .

View Article

Email Breaches Expose Over 37,000 People’s Data at California Colleges

Names, Social Security numbers and birthdates were exposed, along with a variety of other information.

View Article


Top 5 Most Notorious Computer Hackers

In the computer security world, a hacker is basically someone who seeks and exploits weaknesses in a computer system or computer network.

View Article

LinkedIn Responds to Criticism of its SSL Implementation

LinkedIn said that a majority of its users are not affected by the SSL issue reported by security company Zimperium. According to Zimperium, an attacker could launch a man-in-the-middle [MITM] attack...

View Article


Hong Kong pro-democracy tabloid blames Beijing for cyber-attack

A leading Hong Kong pro-democracy newspaper blamed Beijing on Thursday for a massive cyber-attack on its website, just days after a series of similar attacks on an online vote on electoral reform.

View Article

Google’s backward step on Android app privacy

The latest changes to Android’s app permissions takes a broken model and makes it worse. It’s time for a complete overhaul.

View Article

Russia’s Hacker Collective That Wasn’t

Who is backing Russia’s newest “hacker” group, named after “Humpty Dumpty”? Who’s the intended audience for their activity? Images mixed by author.

View Article
Browsing all 2490 articles
Browse latest View live