How to keep mobile devices secure while traveling
“Tis the season to be jolly – and to leave sensitive corporate information behind at the airport! According to telephone interviews with the lost property offices …
Vendor creates malware to sell its anti-malware product
Chinese antivirus software companies seem to have a unusual strategy for keeping its services and products in demand – secretly developing threats themselves and …
Week in review: Gawker breach, social engineering and security predictions for 2011
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Gawker Media breach claimed by Gnosis The credit for the breach of …
FarmVille players lured with fake “farm cash” offer from Zynga
The latest Facebook scam takes advantage of the popularity of Zynga’s FarmVille game and lures users into allowing an application access to their accounts with promises …
Cloud Controls Matrix 1.1 released
The Cloud Security Alliance (CSA) launched revision 1.1 of the CCM Security Controls Matrix, available for free here. The Cloud Security Alliance Cloud Controls Matrix (CCM), …
Bradley Manning offered plea bargain
WikiLeaks’ founder Julian Assange has been released a few minutes before 6 pm (GTM) on Tuesday, after the High Court in London confirmed the decision that he is to be …
NSA considers its networks compromised
Debora Plunkett, head of the NSA’s Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be …
Dell, AMD executives accused of selling confidential information
Market research companies usually pay experts from various industries to give their opinion and provide information about future trends in those industries, and they sell that …
New Facebook feature raises privacy concerns
Facebook users should keep up-to-date with their privacy settings as Facebook announces its latest controversial feature. The social network is launching automated photo …
Companies lack confidence in the effectiveness of controls
A significant number of Global 1000 companies still lack the proper internal controls over, and visibility into, employee access to sensitive applications and data, according …
Performance concerns make 25% of users turn off AV
More than 60 percent of respondents have tried multiple anti-virus products over the course of a year, according to Avira. In addition, 25 percent of the users admitted to …
Tracking protection lists for Internet Explorer 9
Microsoft recently announced that IE9 will enable users to import independently curated lists of third party domains, which can be blocked or allowed access to a user’s …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility