Mobile devices are prime targets for for cyber criminals, and a report by mobile security company Lookout reveals some surprising data about how they plot their attacks.
Tony Bradley |
20 Feb |
Read more
Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.
Tony Bradley |
19 Feb |
Read more
How many apps do you have on your smartphone or tablet right now? Well, take that number, and multiply it by 0.9. That's about how many of your apps are a potential security concern according to a new study from Appthority.
Tony Bradley |
18 Feb |
Read more
Yahoo Mail was hacked. Details are sketchy in terms of just how many Yahoo Mail accounts have been compromised. Yahoo suggests that the attackers most likely gained access to the data through a third-party database outside of Yahoo control. Regardless of how the compromise occurred, there is a lesson to be learned here...again.
Tony Bradley |
31 Jan |
Read more
The year's barely started, and we've already had enough data breaches at major retailers to make a barter economy seem like a good idea. Unfortunately there are yet more security threats to look forward to in 2014. Here are the biggest ones we anticipate.
Tony Bradley |
30 Jan |
Read more
Three major retail chains have recently admitted being victims of massive data breaches that compromised sensitive data from over 100 million customers. Sadly, though, Target, Nieman-Marcus, and Michael's are just the beginning of a trend that isn't likely to fade away any time soon.
Tony Bradley |
27 Jan |
Read more
Hopefully your company will never be the victim of a massive data breach. If it is, though, and customer data is compromised, make sure you don't follow Target's lead when it comes to notifying customers. Target's customer notification efforts are wrong on almost every level.
Tony Bradley |
17 Jan |
Read more
As 2013 winds to a close, it's time to look back at the biggest security events and incidents of the year. Here's hoping there are some lessons to be learned--something to provide a foundation for stronger protection and a safer online and mobile world in 2014 and beyond.
Tony Bradley |
26 Dec |
Read more
As 2013 winds to a close, it's time to look back at the biggest security events and incidents of the year. Here's hoping there are some lessons to be learned--something to provide a foundation for stronger protection and a safer online and mobile world in 2014 and beyond.
Tony Bradley |
26 Dec |
Read more
Hackers have exposed millions of passwords from Facebook, Google, and Twitter. Sadly, password compromise is so common that it barely even registers as news any more. Suffice to say that it's probably time to change your password again.
Tony Bradley |
06 Dec |
Read more
The average smartphone user has 26 apps installed. If recent research conducted by HP is any indication, approximately, well, all of them, come with privacy or security concerns of some sort.
Tony Bradley |
05 Dec |
Read more
The holiday season is officially underway. Your good cheer could quickly turn sour, though, if you don't secure your browser before shopping online. Research from Qualys found that almost 40 percent of all browsers have critical vulnerabilities that could enable cyber criminals access to your personal data.
Tony Bradley |
05 Dec |
Read more
Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored. Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT."
Tony Bradley |
04 Dec |
Read more
Everything's coming up mobile these days. Gartner estimates that PC sales will make up only about 13 percent of device sales in 2013 - and some undisclosed portion of those PCs are notebooks. The more we rely on small, mobile devices to get things done, the more we also depend on Cloud storage and services to extend functionality beyond what the mobile device itself is capable of. That's why mobile and Cloud will become mobile Cloud.
Tony Bradley |
27 Nov |
Read more
In a couple days the United States will celebrate Thanksgiving, and Black Friday--the official launch of the 2013 holiday season will go into high gear. Traditionally, the Monday following Thanksgiving is Cyber Monday--the day the online retailers offer holiday deals too good to pass up. Cyber criminals know this as well, though, which makes Cyber Monday a very risky proposition.
Tony Bradley |
27 Nov |
Read more