Please turn on your JavaScript for this page to function normally.
Rental computers spied on and photographed users, FTC claims

Seven rent-to-own companies and a software design firm have agreed to settle Federal Trade Commission charges that they spied on consumers using computers that consumers …

IEEE data breach demonstrates need for increased server-level security

According to news reports, the usernames and passwords of 100,000 members of the Institute of Electrical and Electronics Engineers (IEEE) have been found unencrypted on a FTP …

Most 5 year olds already use an Internet enabled device

Children as young as five have easy access to an internet enabled device. A One Poll study of 2,000 parents of children aged 5 to 15 also shows six parents in ten frequently …

Bogus Second Life survey leads to card info theft

Users of popular online virtual world Second Life are in danger of getting their credit card details stolen via phishing pages that supposedly offer 2500 Linden dollars …

Stolen card data on sale on professional-looking e-shop

The theft of debit and credit card information has become a lucrative business, but sometimes the individuals that engage in the stealing are not so eager to user the …

Facebook turns off facial recognition in Europe

Facebook has assented to keeping the facial recognition feature (“Tag Suggest”) for its European users off until European regulators allow it to be reinstated, and …

Passwords Plus for Mac OS X released

DataViz announced the availability of Passwords Plus for Mac OS X, plus updated versions for iOS and Windows. Passwords Plus stores and protects PINs, passwords, and other …

Google adds Do Not Track support to Chrome

The next official release of Google’s Chrome browser will more than likely support the Do Not Track (DNT) initiative by sending the DNT HTTP header to websites if the …

Structured method to data breach analysis and response

Data breaches are growing in frequency and magnitude, and have a tremendous financial, legal, operational and reputational impact to the breached organization, whether …

39% of IT staff can get unauthorized access to sensitive information

IT professionals are allowed to roam around corporate networks unchecked, according to a survey of more than 450 IT professionals by Lieberman Software. It found that 39% of …

Publishing firm says leaked Apple IDs came from their servers

BlueToad, a Florida-based digital edition publishing company, has announced that the recent massive Apple UDID leak originated from their own servers, and not an FBI laptop. …

11,000 Guild Wars 2 accounts hacked in ongoing attacks

The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily …

Don't miss

Cybersecurity news