Please turn on your JavaScript for this page to function normally.
12 steps for surviving an OCR breach investigation

ID Experts offers 12 steps to help covered entities identify key items in their privacy and security programs that will protect the privacy of their patients before a data …

Free tool for healthcare to handle privacy breach investigations

The U.S Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has been cracking down on its enforcement of the HIPAA/HITECH Privacy, Security and Data …

Spear phishers target Craigslist users

Spear phishing is quickly becoming the favorite way for cyber intruders to gain access to company and government systems. But even private individuals aren’t safe, and a …

Employee-owned mobile devices are riskiest

More than half of information technology leaders in the US believe that any employee-owned mobile device poses a greater risk to the enterprise than mobile devices supplied by …

Iran aims to exchange the global Internet for a national one

The Iran government is increasingly unsatisfied with the influence the Internet is exercising on the country’s citizens despite its censorship efforts and is planning on …

Encrypt files on Mac with BestCrypt

Jetico announced that their popular BestCrypt Container Encryption software now offers full compatibility with Mac computers. The software delivers data protection. Selected …

Fake Epsilon breach warning tricks users

Among the most annoying things you can find online are pages that pretend to offer or try to push a service in order to make money by simply referring the user to another …

35 million Google Profiles collected into private database

If you are one of those individuals that made their own Google Profile, chances are that you knew and agreed to the fact that the information you included in it will be …

Sony online store hacked and user information published

It seems that hacking Sony’s assets has become a communal game in the hacker underground. Since the PSN hack, hardly a week went by without a hacker notifying the public …

US communications privacy law in for a change?

As technology speeds progressively forward, privacy laws need to get updated. As the amount of information we share and keep online – on social networks, stored in cloud …

Journalist arrested for article on Facebook privacy flaw

Australian journalist Ben Grubb was arrested yesterday following the publication of an article he wrote about a demonstration of how to access Facebook photos even if they are …

Two teenage GhostMarket members sentenced

Two UK teenagers who stole credit card details from a number of online casinos, betting companies and web hosting companies and sold them on the now defunct GhostMarket have …

Don't miss

Cybersecurity news