Security
Explore Articles
-
No Consensus on Details for Privacy Legislation After Senate Hearing
Lawmakers are trying to balance business interests with consumer needs as they grapple with online security and privacy. Federal officials…
-
Apple Pushes Fixes for 11 Java Vulnerabilities in Mac OS X
Apple has pushed out the fixes for the Java remote code vulnerabilities Oracle patched earlier this month, including a serious…
-
Apple iOS, Google Android Security Features Analyzed by Symantec
Even though both Apple’s iOS and Google’s Android smartphone operating systems are pretty secure, they are still susceptible to multiple…
-
Northrop Grumman Regularly Repels Advanced Attacks Seeking Sensitive Data
Organized hackers have been attempting to breach aerospace and defense company Northrop Grumman for years to steal sensitive information, according…
-
Business Data Breach Threat a ‘Statistical Certainty’
Cyber-attacks are becoming more frequent and severe with the vast majority of businesses suffering as least one data breach in…
-
Dropbox Password Flub Shows Why Data Encryption Matters
As Dropbox tries to appease irate customers after the weekend debacle where it accidentally turned off passwords to all user…
-
New Malware Bypasses Android Market, Downloads Directly to Mobile Phones
Lookout Mobile Security is warning of a new kind of Android malware that bypasses Google’s protections and targets the user’s…
-
Security Risk From Malware, Spam Greater in 2011
“Trusted malware” is continuing to grow at an alarming rate, according to a new report that provides insight, background and…
-
Fake Antivirus Pages Found in Poisoned iCloud Search Results
Businesses and analysts aren’ t the only ones interested in Apple s upcoming iCloud service. Scammers are moving in on…
-
Bill to Restrict Mobile Location Data Collection Introduced in the Senate
Two United States senators have introduced a bill that would require companies to explicitly get permission from mobile users before…