Mobile Devices Are the New ‘Wild West’
It all starts with a new frontier. Then, the pioneers come to explore and exploit the frontier, followed by settlers moving in to claim the frontier as their own. That brings on the “wild west”—a...
View ArticleStudy: Companies can halve authentication costs by ditching hardware tokens
Large enterprises can save more than $165,000 by shifting to smart device-based software for vital authentication in BYOD era Oslo, Norway, 4th July, 2012 – A new study, carried out by authentication...
View ArticleHackers expose 453,000 credentials allegedly taken from Yahoo service
Hackers posted what appear to be login credentials for more than 453,000 user accounts that they said they retrieved in plaintext from an unidentified service on Yahoo. The post Hackers expose 453,000...
View ArticlePhishing Update: ‘No Brand is Safe’
The number of phishing sites are at an all-time high, according to a new report. And so is the number of targeted brands. The message is: “No brand is safe.” The post Phishing Update: ‘No Brand is...
View ArticleEU Mulls New Rules for Cybersecurity
Mandatory risk management for social networks could form part of a European Commission legislative proposal on network and information security, it was revealed as a public consultation on the issue...
View ArticleBYOD: Tech chiefs still split on the benefits, concerned about security
The bring your own device (BYOD) trend continues to gain momentum as execs at the top of businesses, and younger workers at the bottom, demand the right to use their own smartphones, tablets and...
View ArticleSimple Google search reveals credit card details
A year after massive security failings were exposed by hosting firm UKFast, consumers’ credit card details are still as openly available as a pair of shoes on the internet, leaving them open to serious...
View ArticleSophos releases Mobile Security applciation to protect Android devices
Security software and hardware developer Sophos has released a free lightweight anti-virus app, Mobile Security, that protects Android devices against malware, privacy issues and hardware loss. The...
View ArticleTesco web security ‘flaw’ probed by UK data watchdog
The UK’s data privacy watchdog is examining the security of Tesco’s website after a string of experts highlighted concerns. The post Tesco web security ‘flaw’ probed by UK data watchdog appeared first...
View ArticleFrankenstein virus stitches malware together from pieces of benign code
Computer scientists from the University of Texas have created a piece of self-camouflaging malware — called Frankenstein — that stitches together pieces of benign code stolen from regular programs. The...
View Article
More Pages to Explore .....