Quantcast
Browsing all 375 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Facebook at Work: A Data Security Issue?

Many employers block access to Facebook, Twitter, and other social media sites in order to keep their employees focused on the task at hand. But now IT professionals might have new reasons to limit...

View Article


Image may be NSFW.
Clik here to view.

Mobile Security Update: 1 in 10 Android Apps Is a Virus

HackSurfer reports on the sorry state of cyber security on the Android platform where 1 in 10 apps contains malware. Yikes.You read that correctly: 10 percent of Android apps are malware. Over the last...

View Article


Image may be NSFW.
Clik here to view.

IT Professional's Firing Would Have Been a Lawsuit for an IT Contractor

The Arizona Republic reports that Miguel Corzo, a community college IT employee who had been working in the district for 30 years, has been fired after his actions led to a data breach that has already...

View Article

Image may be NSFW.
Clik here to view.

California Data Breach Law Raises as Many Questions as It Answers

IT consultants are subject to a variety of state laws. Your legal responsibilities change from state to state, and each new court ruling – such as the one that just occurred in California – can...

View Article

Image may be NSFW.
Clik here to view.

DDoS Is the New Black

CNET reports that distributed denial of service (DDoS) attacks have occurred at an unprecedented rate in the first half of 2014. This year has already had more than twice the amount that occurred in...

View Article


Image may be NSFW.
Clik here to view.

Mega-Breach Is an Excellent Client Education Opportunity

When Target's data breach hit the front pages, many small-business owners saw it as evidence that hackers only go after big business. But the latest – and largest– data breach, which stole 1.2 billion...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Security Conference: Hackers Can Steal Your Car

Last week's Black Hack security conference brought exposure to countless security flaws in nascent Internet-of-Things technology. CBS News reports that security consultants have found ways to...

View Article

Image may be NSFW.
Clik here to view.

The Puns Are Bad, but the Security Threats Are Worse

The average user probably doesn't even suspect that their SOHO (small office / home office) router could be hacked. When your small business clients think about network security, they probably only...

View Article


Image may be NSFW.
Clik here to view.

Old Technology Is a Cyber Liability

In last week’s blog post, "Black Hat Security Conference: Hackers Can Steal Your Car,” we looked at how new technology – the Internet-of-Things and Internet-enabled cars – exposed consumers to greater...

View Article


Image may be NSFW.
Clik here to view.

Facebook Color-Changer Malware Has Users Feeling Blue

TechHive reports that over 10,000 users have fallen victim to a Facebook-based malware attack. Like other schemes before it, the color-changer malware purports to allow users to customize their...

View Article

Image may be NSFW.
Clik here to view.

Why a Cyber Attack at Your Bank Could Be Terrible News

While individual consumers can be reimbursed for fraudulent charges on their bank accounts, it's much harder for businesses to recover damages related to a cyber heist. This means it's important for IT...

View Article

Image may be NSFW.
Clik here to view.

Netflix: Use Our Hack-Scanning Software

Though it might be most famous its binge-watch streaming service, Netflix has produced open source tools that can protect businesses from data breaches and DDoS attacks.According to The Register,...

View Article

Image may be NSFW.
Clik here to view.

The Latest Oxymoron: Android Security

Maybe you weren't surprised when researchers at the University of New Haven posted a series of videos showing that many common Android apps contained serious data privacy flaws that could allow cyber...

View Article


Image may be NSFW.
Clik here to view.

91% of Businesses Underestimate the Number of Cyber Threats They Face

If you had to pick a number, how many new variants of malware do you think threaten businesses each day? That was the question posed to roughly 4,000 IT professionals in a new data security survey from...

View Article

Image may be NSFW.
Clik here to view.

Adobe Update Part 1: Something to Talk About (With Clients)

According to ThreatPost, Adobe was all set to roll out a new version of Reader when software testing revealed the update was full of flaws and security holes that would have exposed millions of users...

View Article


Image may be NSFW.
Clik here to view.

Adobe Update Part 2: A Look at Professional Liability for Software Developers

The backstory behind Adobe's latest patch shows hazards that all software and app developers face. According to a ThreatPost article, Adobe was about to release updates to its Reader and Acrobat...

View Article

Image may be NSFW.
Clik here to view.

Banking Trojans: Not Just for Banks Anymore

Innovation is the name of the game in IT, but the same holds true in the seedy world of cyber crime, where hackers are always changing their strategies and finding new ways to use old malware. Let's...

View Article


Image may be NSFW.
Clik here to view.

Home Depot Data Breach Already Causing Customer Losses

The Star’s report on Home Depot's data breach shows just how quickly cyber criminals can make a profit from a cyber attack. The hackers have already used stolen data to drain bank accounts, purchase...

View Article

Image may be NSFW.
Clik here to view.

Shellshock Sure Understands the Halloween Spirit

The Shellshock vulnerability – a bug that exposes Unix-based computers (including Mac OS X) to remote code-injection attacks – burst onto the scene just in time for Halloween. It's currently spooking...

View Article

Image may be NSFW.
Clik here to view.

The Free Security Tool Your Clients Probably Aren't Using

As IT security blogger Brian Krebs reports, last week saw a wave of critical security updates to Microsoft Windows, Java, and two Adobe programs.Your clients might not realize that by delaying an...

View Article
Browsing all 375 articles
Browse latest View live