privacy - News, Features, and Slideshows
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers.
By Tony Bradley | 05 May, 2010 23:35
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
New attack types combine known and unknown threats to exploit “unknown” vulnerabilities. Attackers are also hiding malware inside documents, websites, hosts and networks. These attacks have many purposes such as financial and ideological motives. They focus on stealing data, sabotaging business continuity, or damaging a company’s reputation.
- Google's Project Loon close to launching thosands of balloons
- Shape-shifting robot reveals secrets of Fukushima reactor
- FCC faces seventh net neutrality lawsuit
- Next on the Office expansion list: Windows 10 phone apps
- Why investors are so excited about Slack
- First Apple Watch health IT apps bring important messages to the wrist
- Insurance company now offers discounts -- if you let it track your Fitbit
- Apple's 12-inch MacBook can use third-party USB Type-C cables
- Gurucul identifies cloud threats based on identity, behaviors
- Microsoft shows impressively accurate hand-tracking system for VR
- Docker update speeds and organizes container deployments
- Facebook tries to keep it real by killing more 'fake' likes
- Feds lay down social media rules; enterprises should, too
- Should computers determine how our kids learn to talk? Maybe not
- Keep Windows 10 preview up to date -- or face a dead PC