A study from digital security company viaForensics paints a stark picture of the vulnerability of <a href="http://www.pcworld.com/article/237345/phone_data_caps_five_things_you_shouldnt_do_too_often.html">smartphone</a> user data. viaForensics evaluated 100 popular consumer apps running on Android and iOS, and found that 76 percent store usernames, while 10 percent store passwords as plain text. Those 10 percent included popular sites such as LinkedIn, Skype, and Hushmail.
Ilie Mitaru |
12 Aug |
Read more
Hackers defaced the official Blackberry Blog today in retaliation for Research In Motion's pledge to assist police "in any way we can" in their efforts to quell the riots in London in recent days.
John P. Mello Jr. |
10 Aug |
Read more
The Information Commissioner's Office (ICO) has found a school in Hampshire in breach of the Data Protection Act (DPA) after the personal details of nearly 20,000 people were put at risk when the school's website was hacked.
Anh Nguyen |
09 Aug |
Read more
Cisco has admitted to sending customers warranty CDs that, when opened in a browser, took users to a website know to have hosted malware.
Liam Tung |
05 Aug |
Read more
Wikileaks, hacking incidents like those attributed to LulzSec, and even the UK's News of the World voicemail scandal represent a fourth stage in the evolution of cybercrime, according to Dr Paul Nielsen, director and chief executive officer of the Software Engineering Institute (SEI) at Carnegie Mellon University (CMU) in Pittsburg.
Stilgherrian |
08 Aug |
Read more
Stories about lost wages aren't the only scary things being talked about in Sin City this week. The best security researchers and hackers from around the world have gathered in Las Vegas, and news about their work has been creeping out like a toxic flood.
Christina DesMarais |
07 Aug |
Read more
If you'd never heard the phrase 'advanced persistent threat' before, you may have gotten an ear full of it the past week in a collection of news stories that used the APT term to describe a variety of network security problems that are causing big problems.
Ellen Messmer |
06 Aug |
Read more
The U.S. Federal Bureau of Investigation on Friday <a href="http://www.fbi.gov/news/stories/2011/august/child_080511/child_080511">introduced its first mobile app</a>: an iPhone application aimed at helping parents whose children go missing.
Nancy Gohring |
06 Aug |
Read more
Despite Microsoft’s efforts to make its User Access Control (UAC) security prompts less annoying, many users are still turning it off and in doing so helping thieves do their job, according to Microsoft.
Liam Tung |
05 Aug |
Read more
The best way to protect business information on smartphones from cybercriminals is to leave that information off smartphones, according to a mobile security expert.
Grant Gross |
05 Aug |
Read more
Standards body the IEEE has called for proposals to build a catalogue of people using binary “packers”, the software tools often used by malware writers to hide executable files from antivirus products.
Liam Tung |
04 Aug |
Read more
Every major corporation harbouring valuable information has been compromised, but only some know it, according to executives at McAfee and RSA.
Liam Tung |
04 Aug |
Read more
While 69 percent of organizations have employees <a href="http://www.csoonline.com/article/681822/just-say-yes-why-banning-consumer-devices-makes-your-organization-less-secure">using personal devices to connect to their corporate network</a>, more than one-fifth, or 21 percent, currently have no policy in place to govern the use of personal mobile devices on their network. These new figures, released recently from security-products firm <a href="http://www.csoonline.com/article/684895/password-management-systems-how-to-compare-and-use-them">Courion</a>, suggest many security leaders are still ignoring the need to address mobile-device management among their employees.
Joan Goodchild |
04 Aug |
Read more
Using data collected from its Mobile Threat Network, Lookout today released a full report on the state of mobile malware and security. The report covers both Android and iOS, and compares the risks that both platforms face. You can view and download the full report on Lookout's blog, but here are a few of the highlights:
Armando Rodriguez |
04 Aug |
Read more
Soon, SAP hopes to sew up a gaping security hole for its 7,000 iPad-toting employees. The Germany-based tech giant is beta testing a product that will allow it to send PGP-encrypted confidential email to employees. In turn, employees will be able to decrypt them using a Symantec viewer iPad app.
Tom Kaneshige |
04 Aug |
Read more
An explosion in mobile malware during the last six months has more than doubled the chance that a user's Android smartphone will become infected, a security researcher said today.
Gregg Keizer |
03 Aug |
Read more
Search engine poisoning, social networking scams and fake anti-virus have been the top security threats in 2011 so far, according to security vendor Sophos. All three rely on social engineering to achieve their aims.
Stilgherrian |
02 Aug |
Read more
The Australian Competition and Consumer Commission's SCAMWatch has warned of a new remote access scam, with perpetrators impersonating Telstra or BigPond employees and requesting remote access to a mark's computer.
TechWorld staff |
02 Aug |
Read more
We depend on our computers to get work done, and so we try to safeguard them appropriately. But our trusty laptops, desktops, and tablets rely on their own internal network of sophisticated computer chips to function. These tiny chips--called microcontrollers--regulate everything from the battery in your laptop to the headlights on your car--and they aren’t always so secure.
Alex Wawro |
30 Jul |
Read more
Malicious software is leaping from PCs to cell phones, as malware makers target the platform in hopes of making a quick buck. Examples include the infected DroidDream and Plankton Android apps. An infected app released into the Android Market can infect several thousand users’ phones before anyone discovers the presence of the malware. Though the extent of Android malware has been overstated, it's best to learn now how to protect yourself and your data from attacks, instead of waiting until mobile malware becomes a more serious problem.
Armando Rodriguez |
30 Jul |
Read more