Please turn on your JavaScript for this page to function normally.
Protecting mobile phones? Most don’t bother

Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …

The privacy officer’s agenda according to Gartner

Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …

Drive-by attacks targeting smartphones are in our future

A new study that has analyzed the behavior of 10,000 applications downloaded from the Android Market, shows that many mobile applications leak personal information and that …

Granular access to encrypted data in the cloud

Newline Software announced the release of OPTIC, Online Privacy Technology In the Cloud. The solution allows developers to securely query, write, and read encrypted data to …

AVG releases Premium Security

AVG announced Premium Security, the Internet security solution that surveys the Web for incidents of stolen identity. It includes AVG Identity Alert, AVG Internet Security and …

Phishers becoming sophisticated marketers of fraud

Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …

Google still grabbing more than just Wi-Fi devices’ MAC address?

Google is in for another privacy dispute, as it seems that its Street View cars have not been collecting only hardware IDs of detected Wi-Fi devices, but also the MAC …

22% in US admit to potential abuse of private data

22% of US, 29% of Australian and 48% of British employees who have access to their employer’s or client’s private data, would feel comfortable doing something with …

Power to the people: Securing consumerized devices

The consumerization genie is out of the bottle. Employees are increasingly using consumer-focused websites and apps such as Twitter, Facebook and LinkedIn for work-related …

An anonymous social network in the making?

Spurred by blocked accounts of Anonymous members and activists on various popular social networks such as Facebook, Twitter, and (recently) Google+, a group apparently loosely …

Verizon takes on issue of stolen credentials

Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …

Law enforcement supports new U.S. data retention bill

A new proposal for a U.S. federal law that would compel ISPs to retain logs regarding their customers for 18 months is currently being discussed in the House of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools