Business continuity management is the key to securing your company’s digital future despite disruptive incidents, from power outages and IT errors to fires, floods, tornadoes, earthquakes, and tsunamis.
Samsung has upstaged rival Apple with a fingerprint-locked version of the password-vault app LastPass for its flagship Samsung Galaxy S5, available free on Google Play from today. One swipe unlocks ANY app or site on the phone.
Anyone with an AOL email address was urged to change their password and security questions this week after a cyber attack which compromised a “significant number of user accounts” – quoted by news agency Reuters as around 2% of all AOL accounts.
Parents who simply hand an iPhone or iPad to a child and let them play a favorite game risk children buying expensive in-game items. But the new version of iOS has some great defenses built in.
Many mainstream news outlets offered advice on dealing with the Heartbleed bug – some misleading. This week, a spoof video has finally cut to the heart of the matter, and offered the worst advice imaginable on how to deal with the bug.
Posts promising gruesome footage of a roller coaster accident at Universal Studios in Florida in which 16 people supposedly died are spreading fast on the social network – with victims fooled into spreading the scam to their friends.
Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.
Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to make attacks difficult for cyber gangs, in a speech given as he is inducted into the Infosecurity Europe Hall of Fame on May 1.
New evidence has emerged that the new iPad will have fingerprint security built in, as found on the Apple iPhone 5S.
Job scams are a permanent fixture in cyberspace. Anyone who has posted their resume online has offered cyber gangs two crucial pieces of information – one, a way to contact them, and two, the fact they’re in need of a job.
Every single one of 30 major companies tested by Cisco over the course of 2013 had malicious traffic on their networks, according to an annual report released by the company. Spyware and other malware was also growing rapidly on mobile devices.
Young people are seriously worrried about connected gadgets when it comes to privacy – worrying that ‘connected’ gadgets such as Smart TVs could give away more data than they are comfortable with, according to a new survey.
Twitter was flooded by an avalanche of spam from compromised accounts, leading to shortened links and pages promising miracle weight loss, diet pills, and products which would “change lives”. The attack appeared to have come via a third-party service connected to Twitter.
Google is offering full refunds to buyers of the Virus Shield app which briefly topped the Android charts last week – but turned out to offer no protection whatsoever.
The financial damage caused by a large data breach or malicious employee activity can be enormous, but the lack of financial protection in place could lead to a “global” shock, a report by a leading insurer has warned.
When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.