Coursera privacy issues exposed
When well-known lawyer and Stanford law lecturer Jonathan Mayer was invited to teach a course on government surveillance on Coursera, the popular online website offering free …
HealthCare.gov breach affected test server, not users
A server within the Healthcare.gov system has been compromised, but the good news is that it didn’t contain consumer personal information. It was just a development …
OS X version of Windows backdoor spotted
A recently discovered backdoor aimed at Mac computers is likely wielded by a long-standing APT group that has previously been known to target US defense firms and …
91% of Americans have privacy concerns
A new survey, conducted by Harris Poll among 2,100 U.S. adults and developed by WP Engine, discovered that 91% of Americans are concerned about their online privacy, while …
Profit leads motives for malware engineers
With mobile malware doubling year after year, NQ Mobile released new data and background information outlining the current threat landscape and projecting trends for the …
Give up on complex passwords, says Microsoft
The Internet is full of advice on how users should go about choosing strong passwords, and on what schemes web admins should implement to make them do so and what protection …
Mounting evidence points towards Home Depot breach
Still officially unconfirmed, a Home Depot hack looks increasingly likely to have happened. As Nicole Perlroth noted, the source of stolen card information can be discovered …
Network vulnerabilities IT admins can use to protect their network
Being able to adapt to change is one of the most important abilities in security today, mostly because attacks to defend against are able to do the same. The sophistication of …
Twitter launches bug bounty program
With a simple tweet, Twitter has officially launched its own bug bounty program. Set up through the security response and bug bounty platform HackerOne, the program offers a …
80% of business users are unable to detect phishing scams
McAfee Labs revealed that phishing continues to be an effective tactic for infiltrating enterprise networks. Testing business users’ ability to detect online scams, the …
Critical Security Controls adoption and implementation
A new SANS survey reports 90% of organizations taking the survey have adopted some or all of the Critical Security Controls (CSCs), and that financial and government …
9 ways to protect data on your smartphone
Recent headlines of Hollywood celebrities’ nude photos leaking onto the Internet remind us of the privacy risks we face when we store personal data – particularly …