Removing CarrierIQ Is A Really Bad Idea For Most Mobile Phone Users
The controversy over stealthy monitoring software by CarrierIQ has raised important questions about user privacy and business ethics in the Brave New World of smart phones, tablets and the like. In the...
View ArticleHP Facing Class Action Suit For Not Disclosing Printer Vulnerability
A class action lawsuit filed in U.S. District Court in California against Hewlett-Packard could have wide ranging implications for software makers, should the court agree with the plaintiff's claim...
View ArticleMicrosoft Previews Massive December Security Updates: 14 Patches, Including...
UPDATE: Microsoft will release 14 security patches next Tuesday, including fixes for security vulnerabilities exploited by the Duqu and BEAST malware.read more
View ArticleHomeland Security Warns SCADA Operators Of Internet-Facing Systems
In the wake of the hack of water and sewer infrastructure operated by a Texas community, the Department of Homeland Security is again warning owners and operators of critical infrastructure to take...
View ArticleAdobe Pushes Fix for ColdFusion Cross Site Scripting Hole. No Word On Reader,...
Adobe on Tuesday released a patch for a vulnerability affecting versions of its ColdFusion Web application development platform. A company spokeswoman said the company still hasn't set a date for an...
View ArticleTwenty Something Asks Facebook For His File And Gets It – All 1,200 Pages
Be careful of what you ask for. That's a lesson that Max Schrems of Vienna, Austria, learned the hard way when he sent a formal request to Facebook citing European law and asking for a copy of every...
View ArticleRestaurant Depot Admits They Were Hacked, Customer Data Stolen
A hack has the Restaurant wholesale chain Restaurant Depot in hot water, after thieves compromised the firm's credit card processing systems and made off with customer information, including credit...
View ArticleGlobalSign Says No Evidence of CA Compromise Found
GlobalSign, the certificate authority that the attacker who compromised Comodo and DigitNotar claimed he had infiltrated as well, said it has completed its months-long security review and found no...
View ArticleInternet Pioneers, Security Experts Send Letter to Congress Blasting SOPA
A group of engineers, networking specialists, security experts and other specialists deeply involved with the Internet's development and growth have sent a letter to lawmakers criticizing the highly...
View ArticleGeneration Y Won’t Listen To IT
The latest generation of desk-jockey’s admitted in a recent CISCO study that they frequently ignore and/or circumvent the information technology (IT) policies of their employers, heightening corporate...
View ArticleTool Estimates Incident Response Cost for Businesses
A thorough and freely available tool aims to help security professionals and executives anonymously tabulate the costs incurred on enterprises following all manner of cyber-incidents. Called CyberTab,...
View ArticleMost Targeted Attacks Exploit Privileged Accounts
Most targeted attacks exploit privileged account access according to a new report commissioned by the security firm CyberArk.
View Article
More Pages to Explore .....