Please turn on your JavaScript for this page to function normally.
Parental control software for smartphones

Code9 Mobile launched Code9 Mobile, a smartphone application that enables families to establish acceptable cell phone usage rules so kids learn to use their mobile devices in …

Protecting mobile phones? Most don’t bother

Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …

The privacy officer’s agenda according to Gartner

Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …

Drive-by attacks targeting smartphones are in our future

A new study that has analyzed the behavior of 10,000 applications downloaded from the Android Market, shows that many mobile applications leak personal information and that …

Granular access to encrypted data in the cloud

Newline Software announced the release of OPTIC, Online Privacy Technology In the Cloud. The solution allows developers to securely query, write, and read encrypted data to …

AVG releases Premium Security

AVG announced Premium Security, the Internet security solution that surveys the Web for incidents of stolen identity. It includes AVG Identity Alert, AVG Internet Security and …

Phishers becoming sophisticated marketers of fraud

Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …

Google still grabbing more than just Wi-Fi devices’ MAC address?

Google is in for another privacy dispute, as it seems that its Street View cars have not been collecting only hardware IDs of detected Wi-Fi devices, but also the MAC …

22% in US admit to potential abuse of private data

22% of US, 29% of Australian and 48% of British employees who have access to their employer’s or client’s private data, would feel comfortable doing something with …

Power to the people: Securing consumerized devices

The consumerization genie is out of the bottle. Employees are increasingly using consumer-focused websites and apps such as Twitter, Facebook and LinkedIn for work-related …

An anonymous social network in the making?

Spurred by blocked accounts of Anonymous members and activists on various popular social networks such as Facebook, Twitter, and (recently) Google+, a group apparently loosely …

Verizon takes on issue of stolen credentials

Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …

Don't miss

Cybersecurity news