The biggest IT security risk to businesses is the use of smartphones in the workplace, a report based on the habits of 5,000 users worldwide has found.
‘Spambots’ are a fact of life on Twitter – fake accounts built to spread everything from infected links to misinformation. Until now, users have had to rely on their instincts, but a tool – “Bot or Not” – helps to uncover fake accounts instantly.
Tax identity fraud is on the rise this year, possibly due to criminals getting craftier in their choice of breach targets. According to a series of reports from Brian Krebs, fraudsters are now targeting third-party payroll services.
Shopping via mobile devices is about to receive a dual boost this fall, if the latest rumors are correct – with Samsung about to join Apple with a high-end tablet built with fingerprint security built in.
A Miami high school student who hacked into his school’s website to change grades is facing “years” in custody, after Jose Bautista, 18, handed a written confession to police, according to ABC News’s report.
A reminder that malicious code can be spread via flash memory cards like SD cards, just as easily as it can spread on USB flash drives. Check these tips to get protected.
US retail giant Target has announced that it is parting ways with Gregg Steinhafel, its chairman, president and CEO.
If you work in an IT department, and think that your board isn’t taking information security seriously enough, then perhaps reminding your executive team about just how badly Target has been affected by its data breach will help focus their minds.
Microsoft rushed out an emergency security fix for Internet Explorer, to fix a flaw which hackers had already exploited – affecting IE versions 6 to 11 on several versions of Windows.
There are many things to remember before travelling and protecting your data is perhaps not the first thing on your mind. Follow these top 5 tips to stay reassured and keep your data secure.
The key to a good cyber defense strategy is to improve knowledge of current threats, and risks to businesses, according to law enforcement professionals speaking at London’s Infosecurity Europe 2014 conference in London.
At 15 payment machines dotted around the Swedish city of Lund, people can buy items without needing a card – or a phone equipped with a “Near Field” chip. All that’s required are the correct veins.
Business continuity management is the key to securing your company’s digital future despite disruptive incidents, from power outages and IT errors to fires, floods, tornadoes, earthquakes, and tsunamis.
Samsung has upstaged rival Apple with a fingerprint-locked version of the password-vault app LastPass for its flagship Samsung Galaxy S5, available free on Google Play from today. One swipe unlocks ANY app or site on the phone.
Anyone with an AOL email address was urged to change their password and security questions this week after a cyber attack which compromised a “significant number of user accounts” – quoted by news agency Reuters as around 2% of all AOL accounts.
Parents who simply hand an iPhone or iPad to a child and let them play a favorite game risk children buying expensive in-game items. But the new version of iOS has some great defenses built in.
Many mainstream news outlets offered advice on dealing with the Heartbleed bug – some misleading. This week, a spoof video has finally cut to the heart of the matter, and offered the worst advice imaginable on how to deal with the bug.
Posts promising gruesome footage of a roller coaster accident at Universal Studios in Florida in which 16 people supposedly died are spreading fast on the social network – with victims fooled into spreading the scam to their friends.