Please turn on your JavaScript for this page to function normally.
Tips to minimize the risk of identity fraud

Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud. Prevention 1. Keep personal data …

Password amnesia and online identity

The use of multiple passwords is posing a security risk to individuals and businesses alike, according to Ping Identity. A new study, which surveyed 2,000 consumers, …

Identity fraud hits 11.6 million in the US

In 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held …

New capabilities for the IBM security intelligence platform

IBM unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to …

Indian govt to ask Yahoo, Google to route emails through servers in India

Web mail service providers such as Google, Yahoo, and others will be asked to route all emails accessed in India through servers located in the country – even if the …

Microsoft says Google also bypassed IE’s privacy settings

Following the discovery that Google and other online advertising companies are bypassing Safari’s default “no tracking” settings with specific code inserted …

“Ex-girlfriend sex video” Facebook scam

Survey scammers love targeting Facebook users, because the social nature of the network makes sure that the scam will be propagated far and wide. The latest of these scams has …

Hackers can find you by tracking your cellphone

Finding out people’s approximate whereabouts by tracing their cellphone signal is something that service providers can easily do, as cellular networks track its …

Secret ad code allows Google to bypass Safari’s “no tracking” settings

Once again, Google has been caught doing something that it shouldn’t be doing: using code in their ads to intentionally bypass the privacy settings of Safari users in …

Imation secures mobile data, identity and workspaces

Imation announced its unified Secure Data, Identity and Mobile Workspace product set, which brings together a combination of encrypted USB storage devices and media, …

Social mobile apps found storing users’ contacts without permission

A week ago, app developer Arun Thampi made public his discovery that Path – a popular iOS app that allows users to keep a journal of their everyday life and share it …

Web-based breach tool for healthcare IT

Healthcare has become one of the most-breached industries, placing hospitals, clinics and health plans under scrutiny of the Department of Health and Human Services (HHS) …

Don't miss

Cybersecurity news