Microsoft releases privacy and security guide for policy makers
Microsoft released the third volume of its popular policymaker booklet, Building Global Trust Online, which includes considerations and guidance for a number of new …
A look at how consumers safeguard their devices
While consumers who have lost a smartphone or had one stolen in the past are significantly more likely to be taking basic protective measures with their current device, nearly …
Thousands of Amazon S3 buckets left open exposing private data
Cloud hosting and cloud storage is all the rage, but there are still some common pitfalls that many organizations overlook. In this article I will walk through an issue that …
New IronKey secure USB flash and hard drives
Imation expanded the IronKey secure USB product line with new hardware encrypted flash and external hard disk drives. The IronKey D80 flash drives and H80 hard drives enable …
Privacy-enhanced identity and authentication platform
SecureKey announced its cloud-based briidge.net identity and authentication platform – a solution that enables people to use devices and credentials they already have to …
PrivacyScan expands cleaning support for Internet and desktop apps
PrivacyScan 1.2 is now available in the Mac App Store with updated privacy cleaning features and support. PrivacyScan protects online and offline privacy by shredding files …
Mobile device data recoveries surge
Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …
Protecting sensitive information on iOS devices
We’ve seen the deep technical research showing what makes iOS devices secure (or sometimes not so much). But once you grok ASLR and code signing, are you really any …
Data breaches in higher education
TeamSHATTER reports on data breaches in the higher education vertical throughout the United States. The past year has seen a substantial uptick in the amount of total records …
“Confidential document on Google Docs” leads to account hijacking
A simple phishing scam aimed at harvesting users’ Google credentials is hitting inboxes around the world, warns Hoax-Slayer. “Please view the document i uploaded …
Japanese student sets up free VPN service
There are a lot of people around the world that would like to bypass firewalls set up by their governments, but not everybody can afford to do it. Enter Daiyuu Nobori, a …
Identity fraud is up, but banks are up to the security challenge
In 2012, the total losses resulting from account takeover and new account fraud each rose by approximately 50% over the previous year. These two fraud types impact consumers …
Featured news
Sponsored
Don't miss
- How much does cloud-based identity expand your attack surface?
- Finding software flaws early in the development process provides ROI
- Zero-day exploitation surged in 2023, Google finds
- NHS Scotland confirms ransomware attackers leaked patients’ data
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)