Please turn on your JavaScript for this page to function normally.
Data security and privacy stopping cloud implementations

Data security, privacy, residency, and compliance issues continue to hinder cloud adoption, with 66 percent of organizations reporting at least one cloud project that has been …

Tips for protecting your privacy

Every month more than 5,000 people take to Twitter to complain about how their mobile device has been snooped on or their visual privacy invaded. Who can’t resist …

Most people want control of information collected by data brokers

As Congress examines how data brokers collect, aggregate and share consumers’ personal information, a new survey by TrustedID shows that most people are confused about …

Whonix: Anonymous operating system

Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware …

Universal Man in the Browser attack targets all websites

Trusteer have discovered a new Man in the Browser (MitB) scam that does not target specific websites, but instead collects data submitted to all websites without the need for …

Fake Apple Store discount card leads to identity theft

Bogus discount card offers purportedly coming from Apple and offering to recipients to buy a AU$100 worth in store credit for the small sum of AU$9 have recently been …

Mozilla launches its privacy-friendly website login system

Remember Mozilla’s introduction of the BrowserID browser-based system for identifying and authenticating users? Well, the login system that was created a …

“Watering hole” sites crucial to new cyber espionage campaign

RSA’s newly dubbed FirstWatch research team has recently presented their findings on a “water holing” campaign that they first spotted back in July. The …

Rental computers spied on and photographed users, FTC claims

Seven rent-to-own companies and a software design firm have agreed to settle Federal Trade Commission charges that they spied on consumers using computers that consumers …

IEEE data breach demonstrates need for increased server-level security

According to news reports, the usernames and passwords of 100,000 members of the Institute of Electrical and Electronics Engineers (IEEE) have been found unencrypted on a FTP …

Most 5 year olds already use an Internet enabled device

Children as young as five have easy access to an internet enabled device. A One Poll study of 2,000 parents of children aged 5 to 15 also shows six parents in ten frequently …

Bogus Second Life survey leads to card info theft

Users of popular online virtual world Second Life are in danger of getting their credit card details stolen via phishing pages that supposedly offer 2500 Linden dollars …

Don't miss

Cybersecurity news