Please turn on your JavaScript for this page to function normally.
12 steps for surviving an OCR breach investigation

ID Experts offers 12 steps to help covered entities identify key items in their privacy and security programs that will protect the privacy of their patients before a data …

25 percent of US hackers are FBI informants

Anyone who has read Kingpin won’t be much surprised by the estimate recently made by Eric Corley, publisher of 2600: The Hacker Quarterly, who said that some 25 percent …

Security a top concern for mobile cloud-based applications

48 percent of a Vordel study respondents noted security as a top concern for connecting from mobile cloud-based applications into the organization. The security challenges …

LulzSec leaks Sony Developer source code

Nintendo has confirmed that the server configuration file published by LulzSec on Friday is the real deal, but says that that is the only thing they managed to access and that …

RSA admits SecurID tokens have been compromised

RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens. The admission comes …

Free tool for healthcare to handle privacy breach investigations

The U.S Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has been cracking down on its enforcement of the HIPAA/HITECH Privacy, Security and Data …

Apple introduces iCloud

Apple introduced iCloud, a set of free new cloud services that work seamlessly with applications on your iPhone, iPad, iPod touch, Mac or PC to automatically and wirelessly …

Fake LinkedIn notifications lead to malware

Malware peddlers are targeting LinkedIn users with rather legitimate-looking messages supposedly coming from the social networking site: If the look of the message seems …

Gmail deactivation spam run leads to phishing forms on Google Docs

A week ago, F-Secure researchers have uncovered a number of spreadsheets with a form functionality that are apparently designed to act as phishing forms. Today, one of these …

Financial data stealing malware on the Amazon cloud

There were some recent comments about Amazon Cloud as a platform for successful attacks on Sony. Now Amazon Web Services (cloud) now are being used to spread financial data …

Fake AV distributed via user profiles on popular sites

An investigation into the methods of distibution of the FakeRean familiy of fake AVs has revealed some interesting facts, says GFI. In order to lure people into downloading …

FBI affiliate organization hacked, user database leaked

Only a day after they leaked the details of over one million user accounts and various databases of Sony Pictures and some of its regional sites, LulzSec announced a …

Don't miss

Cybersecurity news