Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Why hedge funds are under attack by cyber-criminals

For about two years, US hedge funds have been under stealthy attacks from cyber-criminals intent on intercepting trading strategies in order to profit from front-running and other illicit maneuvers,...

View Article


Electronic medical records have security advantages, but systems aren’t perfect

This stack of medical records was found in May at a public dumpster at the York County Solid Waste Facility.

View Article


Coming soon to your wallet and stores – chip cards

Stores in North Jersey and around the country are gearing up for the next generation of credit cards, and consumers can expect to see changes in checkout aisles and in their wallets in coming months.

View Article

Justice Department Employees Improve Phishing Spotting Skills

After a security exercise in December 2013 showed that 37% of the employees of the Justice Department in Canada fell for common phishing scams, the organization continued to raise awareness of the...

View Article

Phishing attack on dating sites was “massive”

Dating sites have become the latest target for phishing emails as a number of campaigns targeting would-be daters have been launched in recent weeks with a variety of frauds resulting.

View Article


Code Spaces Destroyed by Cyber Attack

A hacker deleted most of the company’s data, backups, machine configurations and offsite backups.

View Article

People invested $1.2 million in an app that had no security

Proving that no one learned from Snapchat’s security and privacy spectacle, people invested $1.2 million on an app that had no security. Despite the news it was hacked, Yo still isn’t coming clean.

View Article

Andreessen Horowitz Places $90 Million Bet on Cybersecurity Firm Tanium

Systems and security management company Tanium announced on Sunday that it has secured a massive $90 million in funding from Silicon Valley VC firm Andreessen Horowitz.

View Article


Hedge Fund Loses Millions In Hacking Attack

A US hedge fund lost millions of dollars over a two-month period after hackers installed software to steal trade secrets, it has been revealed.

View Article


Triumfant Unveils Mac Endpoint Security Monitoring Agent

Triumfant, a provider endpoint-focused security monitoring solutions, today announced its support for Mac OS X. Announced at the Gartner Security Risk Management Summit, the new endpoint security agent...

View Article

64-Year-Old Helps Police Catch Phishing Ring

A pensioner in Austria alerted the authorities of illegal money transfers in his online banking account, which led to the arrest of three cybercriminals. The 64-year-old living in Walding in the...

View Article

Mobile Security Is a Top Concern

The security implications of policies regulating the use of personal devices to access company data are acknowledged in many firms, although the measures are often disregarded, a study reveals....

View Article

Consumers Ready for Internet of Things, But Fear Data Privacy and Security...

Security vendor Fortinet released a survey that shows homeowners want to embrace the Internet of Things (IoT), but are worried about privacy and security. In a survey of 1,801 homeowners, Fortinet...

View Article


New York Taxi ID Numbers in Anonymized Logs Are Decrypted

Details of more than 173 million taxi trips have been fully de-anonymized by a software developer in less than an hour. Following a public records request, New York City officials provided Chris Whong...

View Article

Havex RAT Aims at Industrial Control Systems

Security researchers found that cybercriminals adopted new methods for distributing Havex, a remote access Trojan (RAT), and that their attention shifted towards industrial control systems (ICS). Havex...

View Article


False stoned virus detections in Bitcoin files are widespread

Some joker stuffed the virus signature into the return address for a Bitcoin transaction leading to Stoned virus detections when transactions are stored on-disk.

View Article

Jihadists Fight Iraq Battle Online and on Ground

BAGHDAD – Supporters of a powerful jihadist group are waging an online propaganda war in concert with its battles on the ground in Iraq, where Sunni militants have overrun swathes of the country.

View Article


Mobile Malware Preys on Legitimate Apps and Services

With mobile devices being so prevalent, cybercriminals have already tapped this market leveraging vulnerabilities in apps and services in order to make as many victims as possible.The June 2014 McAfee...

View Article

IRS scandal: Ludicrous claims about missing government emails? Been there,...

The stories and claims about this batch of missing emails are virtually identical to those we heard when the Bush administration emails went missing. Incredible incompetence or cover-up?

View Article

The quantum cryptography arms race has begun

Quantum computing may be taking its time to arrive, but when it does, encryption won’t be the same again I’ve been fascinated by quantum computing and quantum cryptography for many years.

View Article
Browsing all 2490 articles
Browse latest View live