A large number of companies are leaving their confidential files at risk by over-sharing with employees, according to a new survey by the Ponemon Institute.
Beat the heat, find somewhere cool to compute! But first check our tips on how to more safely navigate the mall, lobby, library, coffee shop or wherever you go to chill out with your digital devices.
The ‘PokerAgent’ botnet, which we have tracked in 2012, was designed to harvest Facebook log-on credentials, also collecting information on credit card details linked to the Facebook account and Zynga Poker player stats, presumably with the intention to mug the victims.
A Barclays employee accessed her partner’s ex-wife’s bank statements when he was involved in a legal dispute over the terms of a divorce settlement.
ESET has announced Endpoint Security for Android, which it says is specifically designed for the contemporary business environment and adds another layer of protection to the family of ESET Endpoint Solutions and features all the benefits made popular by the previous version of ESET Mobile Security Business Edition. The new Android solution also includes Anti-Theft,
Blackhat keynote speaker Shawn Henry, the former executive assistant director of the FBI’s Criminal, Cyber, Response and Service Branch, started off the day after opening remarks from Jeff Moss, founder of Blackhat. Moss wondered if now was the time for the cyber-security sector to take a more aggressive/offensive approach. Jeff mentioned working for a former
Recently, a new data-stealing worm caught our attention. The reason why it stands out from many similar amateur creations is that its author is most probably Czech, as the text strings, variable and function names used by the malware suggest. The Czech text above is displayed by the worm inside a console window and translates
Ron Bowes, an online security consultant had a thought which he put down on paper so that all the “ingenious” people might be informed. The first and last name (and similar lists) of 100 million users on Facebook is not a remarkable discovery. There is no delight in owning anything unshared. The information “exposed” is