Fake federal tax payment emails lead to malware
“Your federal tax payment was rejected”. We imagine that the sight of these words would make even the most security-aware individuals click on anything in sight as …
Dropbox security glitch allowed anyone to access user accounts
Web-based file hosting service Dropbox has confirmed that a bug introduced by a code push allowed anyone to access any user account by simply typing in a random password for a …
Sega hacked, 1.3 million accounts compromised
Sega Corporation was attacked and its database breached last week, and the fact was confirmed by the company the day after it took its SEGA Pass system offline on Thursday. …
Citigroup data theft the result of a common vulnerability
If the information the NYT has received about the Citigroup breach is correct, and the intrusion was made possible by the exploitation of a vulnerability so frequent and …
10 most common iPhone passcodes
The problem of poor passwords is not confined to computer use, and the fact was discovered by an app developer who has added code to capture user passcodes to one of its …
Two-factor authentication for Mailchimp using AlterEgo
MailChimp is an innovative company that provides mailing list management services with a twist. Their down-to-earth approach and focus towards the best user experience is what …
Encrypted voice calling for Android
Cellcrypt launched Mobile for Android, a version of its encrypted voice calling application that runs on Android devices operating over Wi-Fi, GSM and CDMA wireless networks. …
12 steps for surviving an OCR breach investigation
ID Experts offers 12 steps to help covered entities identify key items in their privacy and security programs that will protect the privacy of their patients before a data …
Free tool for healthcare to handle privacy breach investigations
The U.S Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has been cracking down on its enforcement of the HIPAA/HITECH Privacy, Security and Data …
Spear phishers target Craigslist users
Spear phishing is quickly becoming the favorite way for cyber intruders to gain access to company and government systems. But even private individuals aren’t safe, and a …
Employee-owned mobile devices are riskiest
More than half of information technology leaders in the US believe that any employee-owned mobile device poses a greater risk to the enterprise than mobile devices supplied by …
Iran aims to exchange the global Internet for a national one
The Iran government is increasingly unsatisfied with the influence the Internet is exercising on the country’s citizens despite its censorship efforts and is planning on …