Tips to minimize the risk of identity fraud
Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud. Prevention 1. Keep personal data …
Password amnesia and online identity
The use of multiple passwords is posing a security risk to individuals and businesses alike, according to Ping Identity. A new study, which surveyed 2,000 consumers, …
Identity fraud hits 11.6 million in the US
In 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held …
New capabilities for the IBM security intelligence platform
IBM unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to …
Indian govt to ask Yahoo, Google to route emails through servers in India
Web mail service providers such as Google, Yahoo, and others will be asked to route all emails accessed in India through servers located in the country – even if the …
Microsoft says Google also bypassed IE’s privacy settings
Following the discovery that Google and other online advertising companies are bypassing Safari’s default “no tracking” settings with specific code inserted …
“Ex-girlfriend sex video” Facebook scam
Survey scammers love targeting Facebook users, because the social nature of the network makes sure that the scam will be propagated far and wide. The latest of these scams has …
Hackers can find you by tracking your cellphone
Finding out people’s approximate whereabouts by tracing their cellphone signal is something that service providers can easily do, as cellular networks track its …
Secret ad code allows Google to bypass Safari’s “no tracking” settings
Once again, Google has been caught doing something that it shouldn’t be doing: using code in their ads to intentionally bypass the privacy settings of Safari users in …
Imation secures mobile data, identity and workspaces
Imation announced its unified Secure Data, Identity and Mobile Workspace product set, which brings together a combination of encrypted USB storage devices and media, …
Social mobile apps found storing users’ contacts without permission
A week ago, app developer Arun Thampi made public his discovery that Path – a popular iOS app that allows users to keep a journal of their everyday life and share it …
Web-based breach tool for healthcare IT
Healthcare has become one of the most-breached industries, placing hospitals, clinics and health plans under scrutiny of the Department of Health and Human Services (HHS) …
Featured news
Resources
Don't miss
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam