Gamers increasingly under attack
In this video, Christopher Boyd, Senior Threat Researcher at GFI Software, talks about how scammers increasingly target gamers and gaming databases because of valuable …
IE10 will have “Do Not Track” on by default
As Microsoft released the preview of the next version of its Internet Explorer browser, news that in Windows 8 the browser will be sending a “Do Not Track” signal …
Could security breaches cost lives?
Over a quarter of companies believe that if their sites go down or they suffer a major security breach it could potentially cost customers’ their lives, according to …
Is Flame something that we should worry about?
Much has been said and written in the last few days since the initial discovery of the so-called Flame (SkyWiper) toolkit. Security researchers have split in two camps: those …
When syncing sinks your browser
Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …
Cybercrime goes mobile
Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …
UFED Touch: Field-ready mobile forensics solution
Cellebrite launched UFED Touch, a solution for investigators to extract and decode digital evidence from mobile devices including smartphones, legacy phones, portable GPSs and …
Dissecting modern privacy concerns
In this interview, Al Raymond, VP of Privacy & Records Management at ARAMARK Corporation, discusses the nature of identity in a digital society, the implications of over …
Privacy trends affecting security
In this podcast recorded at the RSA Conference 2012, Gant Redmon, VP of Business Development and General Counsel at Co3 Systems, talks about future privacy laws and trends …
Will the new EU privacy legislation secure Europe’s digital economy?
At the start of 2012, the European Commission announced it is to undertake a comprehensive review of the EU’s 1995 data protection rules. Its aim is to strengthen online …
SMS spying app offered on Google Play
Phone spying apps are usually offered on hacking forums and third party app markets, but given their malicious potential, it’s unusual to see them being offered for sale …
Organizations struggling to enforce policies for managing records
Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …