Mobile carriers to blame for use of secret logging software?
The recent revelation that most Android, BlackBerry and Nokia phones are installed with the Carrier IQ software that logs practically all actions made by the mobile phone …
Data breaches up 32 percent
The frequency of data breaches in healthcare organizations has increased by 32 percent, with hospitals and healthcare providers averaging four data breaches, according to the …
Researcher proves hidden software logs everything on mobile phones
By now, you have already heard about the claims made by 25-year-old Trevor Eckhart that the Carrier IQ software – designed by an eponymous Mountain View company – …
1000+ UN emails, usernames and passwords leaked
A group of hackers that go by the name of “Teamp0ison” has apparently hacked one (or more) of UN’s servers and dumped over 1000 email addresses, usernames …
73,000 Finnish online accounts compromised
The login credentials and email addresses of some 73,000 Finns have been stolen and posted online by unknown attackers who breached the database used by a network of …
Anonymous bloggers in danger of being exposed
You’re a blogger who, for whatever reason, wishes to remain anonymous. You are careful not to mention anything that could tie the blog to you, and you have gone through …
ISPs can’t be forced to filter file-sharing traffic, says EU court
European ISPs will not be required to filter electronic communications which use file-sharing software in order to prevent file sharing which infringes copyright, the European …
ID theft prevention tips
With the rise in online shopping and mobile shopping it’s more important than ever for consumers to take precautions against identity theft this holiday season. …
New IP geolocation technology
ReD announced an upgrade to its IP Geolocation detection technology which enables ReD to track fraud threats using IP identification and geolocation information. This is an …
Ten cyber shopping tips
Safeguarding one’s online identity is even easier this holiday season with the addition of new mobile and iPad applications that allow you to check your balances while …
38,000 emails from U.S. special agent leaked by Anonymous
Law enforcement officers and white hats working for the government or for private companies contracted by the government are among the favorite targets of hacking collective …
Most popular prohibited IT activities in the workplace
In spite of the fact that 74% of the interviewed IT professionals have already misused the company’s IT system, and could have lost their job, if a video recording could …