Hackers raid mass killer’s email accounts for info
After the recent hacking of Norwegian mass killer Anders Breivik Behring’s Twitter account, it seems that the same group of hackers has also decided to compromise two of …
Social networking users becoming privacy aware
A vast majority of computer users do not post vacation memories via social networks, according to a recent survey by Avira. During a June 2011 survey of its customers, …
Parental control software for smartphones
Code9 Mobile launched Code9 Mobile, a smartphone application that enables families to establish acceptable cell phone usage rules so kids learn to use their mobile devices in …
Protecting mobile phones? Most don’t bother
Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …
The privacy officer’s agenda according to Gartner
Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …
Drive-by attacks targeting smartphones are in our future
A new study that has analyzed the behavior of 10,000 applications downloaded from the Android Market, shows that many mobile applications leak personal information and that …
Granular access to encrypted data in the cloud
Newline Software announced the release of OPTIC, Online Privacy Technology In the Cloud. The solution allows developers to securely query, write, and read encrypted data to …
AVG releases Premium Security
AVG announced Premium Security, the Internet security solution that surveys the Web for incidents of stolen identity. It includes AVG Identity Alert, AVG Internet Security and …
Phishers becoming sophisticated marketers of fraud
Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …
Google still grabbing more than just Wi-Fi devices’ MAC address?
Google is in for another privacy dispute, as it seems that its Street View cars have not been collecting only hardware IDs of detected Wi-Fi devices, but also the MAC …
22% in US admit to potential abuse of private data
22% of US, 29% of Australian and 48% of British employees who have access to their employer’s or client’s private data, would feel comfortable doing something with …
Power to the people: Securing consumerized devices
The consumerization genie is out of the bottle. Employees are increasingly using consumer-focused websites and apps such as Twitter, Facebook and LinkedIn for work-related …
Don't miss
- Preparing financial institutions for the next generation of cyber threats
- SEC and FCA fines: Issues jump
- Europeans targeted with new Tor-using backdoor and infostealers
- Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085)
- BloodyAD: Open-source Active Directory privilege escalation framework