LinkedIn unveils optional 2-step verification
“Professional” social networking website LinkedIn is the latest in a string of popular online services and communities that have introduced optional 2-step …
The enterprise security time bomb
Companies are at serious risk of data security breaches as 38 percent of U.S. office workers admit to storing work documents on personal cloud tools and services, according to …
Security software market grew 7.9% in 2012
Worldwide security software revenue totaled $19.2 billion in 2012, a 7.9 percent increase from 2011 revenue of $17.7 billion, according to Gartner, Inc. Gartner said that the …
Deloitte acquires Vigilant’s cyber security services business
Deloitte strengthened its cyber security capabilities today by acquiring substantially all of the assets of Vigilant, a specialist in security monitoring and cyber threat …
Beware of Android Defender mobile scareware
Scareware aimed at mobile users is not nearly as ubiquitous as that directed at those who use Windows-run PCs. Nevertheless, there is some out there. Sophos’ Paul …
Police and FBI must return seized materials to Kim Dotcom
New Zealand High Court Justice Helen Winkelmann has ordered the NZ police and the FBI to go through the digital material seized following the arrest of Megaupload founder Kim …
Becoming a computer forensic examiner
Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order …
Motorola is working on electronic tattoos and authentication pills
Motorola is trying to get back into the swing of things when it comes to innovation, and has been working on a number of fresh ideas regarding the future of authentication. At …
Employees continue to use risky apps on mobile devices
Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …
Amazon launches sign-in service
Amazon launched Login with Amazon, a new service that will enable the over 200 million active Amazon customers to securely and simply login to apps, games, and websites. …
Parents should be concerned about app security
Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …
University of Illinois CS department machines compromised
Several computers in the University of Illinois Computer Science Department have apparently been compromised to host malware-serving websites, security researcher Conrad …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous