Rental computers spied on and photographed users, FTC claims
Seven rent-to-own companies and a software design firm have agreed to settle Federal Trade Commission charges that they spied on consumers using computers that consumers …
IEEE data breach demonstrates need for increased server-level security
According to news reports, the usernames and passwords of 100,000 members of the Institute of Electrical and Electronics Engineers (IEEE) have been found unencrypted on a FTP …
Most 5 year olds already use an Internet enabled device
Children as young as five have easy access to an internet enabled device. A One Poll study of 2,000 parents of children aged 5 to 15 also shows six parents in ten frequently …
Bogus Second Life survey leads to card info theft
Users of popular online virtual world Second Life are in danger of getting their credit card details stolen via phishing pages that supposedly offer 2500 Linden dollars …
Stolen card data on sale on professional-looking e-shop
The theft of debit and credit card information has become a lucrative business, but sometimes the individuals that engage in the stealing are not so eager to user the …
Facebook turns off facial recognition in Europe
Facebook has assented to keeping the facial recognition feature (“Tag Suggest”) for its European users off until European regulators allow it to be reinstated, and …
Passwords Plus for Mac OS X released
DataViz announced the availability of Passwords Plus for Mac OS X, plus updated versions for iOS and Windows. Passwords Plus stores and protects PINs, passwords, and other …
Google adds Do Not Track support to Chrome
The next official release of Google’s Chrome browser will more than likely support the Do Not Track (DNT) initiative by sending the DNT HTTP header to websites if the …
Structured method to data breach analysis and response
Data breaches are growing in frequency and magnitude, and have a tremendous financial, legal, operational and reputational impact to the breached organization, whether …
39% of IT staff can get unauthorized access to sensitive information
IT professionals are allowed to roam around corporate networks unchecked, according to a survey of more than 450 IT professionals by Lieberman Software. It found that 39% of …
Publishing firm says leaked Apple IDs came from their servers
BlueToad, a Florida-based digital edition publishing company, has announced that the recent massive Apple UDID leak originated from their own servers, and not an FBI laptop. …
11,000 Guild Wars 2 accounts hacked in ongoing attacks
The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily …
Featured news
Sponsored
Don't miss
- Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
- LastPass users targeted by vishing attackers
- Protobom: Open-source software supply chain tool
- The key pillars of domain security
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)