Identity thief admits stealing $770,000
A Brooklyn, N.Y., man pleaded guilty for his role in managing a credit card fraud operation that operated throughout the East Coast of the United States. Jonathan Oliveras, …
Bitdefender Mobile Security for Android now with live tracking anti-theft feature
Bitdefender added two major new features to its free Mobile Security for Android Beta. The new anti-theft function allows users to easily track where their device is and to …
Gordon Ramsey says father in law hacked into his email
UK celebrity chef Gordon Ramsey claims that Chris Hutcheson – the father of his wife and former chief executive of his global restaurant business – has hacked into …
Half of organizations lost information on USB drives
Inexpensive consumer USB Flash drives are ubiquitous in all manner of enterprise and government environments – typically with very little oversight or controls, even in …
Sony PSN offers identity protection to users
Almost four months after admitting that its PlayStation Network servers have been breached and the personal information of 70 million users has been compromised, Sony has …
Hackers raid mass killer’s email accounts for info
After the recent hacking of Norwegian mass killer Anders Breivik Behring’s Twitter account, it seems that the same group of hackers has also decided to compromise two of …
Social networking users becoming privacy aware
A vast majority of computer users do not post vacation memories via social networks, according to a recent survey by Avira. During a June 2011 survey of its customers, …
Parental control software for smartphones
Code9 Mobile launched Code9 Mobile, a smartphone application that enables families to establish acceptable cell phone usage rules so kids learn to use their mobile devices in …
Protecting mobile phones? Most don’t bother
Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …
The privacy officer’s agenda according to Gartner
Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …
Drive-by attacks targeting smartphones are in our future
A new study that has analyzed the behavior of 10,000 applications downloaded from the Android Market, shows that many mobile applications leak personal information and that …
Granular access to encrypted data in the cloud
Newline Software announced the release of OPTIC, Online Privacy Technology In the Cloud. The solution allows developers to securely query, write, and read encrypted data to …