Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

Until the Tails privacy tool is patched, here's how to stay safe

Patches are ready for IP2, the vulnerable component in Tails, but it's not clear when Tails will update

The hidden dangers of “good enough” authentication

Variances in multi-factor authentication approaches can mean the difference between true security and susceptibility to phishing, between timeliness and late arrival of authentication codes, and between user-friendly and hard-to-use...


Mobile security: A mother lode of new tools

You may know your smartphone, but pretty soon the question will be: How well does your smartphone know you?

"Onion" ransomware the next Cryptolocker: Kaspersky

Kaspersky Lab has uncovered a type of encrypting ransomware that attempts to hide its malicious nature.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

10 new social media scams to watch out for

Scams on social networks are nothing new, but they're constantly changing to keep up with and take advantage of the latest apps, trends, and news. Here are some of the most recent scams that are making the rounds.

google logo

Criminals ride Google coattails in DDoS attacks

The easy access Google's web crawlers have to sites is increasingly being exploited by cybercriminals in launching distributed denial of service attacks, a security vendor says.

Security must evolve to be ‘all about the data’

Experts on panel discussion sponsored by Dell agree that the current security model is obsolete, and that to face the expanding and evolving threat landscape will require embedding data itself with smart security protection

How to prevent a website compromise like StubHub

The use of stolen passwords to compromise the website of ticket seller StubHub is a reminder that additional layers of protection are often needed for sites holding sensitive data.

Increase Network Performance with Path Selection

The hybrid networking model with path selection technology enables organizations to adopt hybrid networks to maximize the performance of applications, increase network availability, & reduce costs while retaining IT control and

Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress

New SSL server rules go into effect Nov. 1

Public certificate authorities (CAs) are warning that as of Nov. 1 they will reject requests for internal SSL server certificates that don’t conform to new internal domain naming and IP address conventions designed to safeguard...

'Anonymous Kenya' group hacks government Twitter accounts

Hack calls government security preparedness into question

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Transforming Business Performance with Hybrid Networks

IT organizations globally are faced with the challenge to transform network architectures to deliver the right performance and reliability cost-effectively while retaining control. Learn more in this white paper.

Are you prepared to address the security impact of aging coders on key systems?

Recognizing the impact of aging coders on the security of key systems is not yet a priority. Which is precisely why it’s important. Here are some considerations.

For less than the cost of a week’s groceries, you too can be a cybercriminal

New research from Trustwave compares the cost of popular malware kits against the cost for common items people buy every day.

Dutch spy agencies can receive NSA data, court rules

Because raw data is shared in bulk, less stringent privacy safeguards apply, the court said

Arrests made after international cyber-ring targets StubHub

StubHub accounts were compromised and used to buy tickets for popular events, which were then resold

5 Things You Didn't Know About Cloud Backup

IT departments are embracing cloud backup, but there's a lot you need to know before choosing a service provider. Learn all the critical things you need to know by accessing the white paper, 5 Things You Didn't Know About Cloud Backup.

ecb logo hq

European Central Bank confirms data breach and extortion attempt

The European Central Bank has confirmed a data breach, after attackers compromised an application on the Frankfurt-based bank's website.

When is your infrastructure safe from Heartbleed?

Now that IT departments have fixed the Heartbleed bug in most internet-facing software, security pros have started debating the risk of not patching software buried deep in the data center.

Firm says vulnerability in Tails contained in I2P component

The flaw is one of several found by Exodus Intelligence, a vulnerability broker

EBay faces class action suit over data breach

The proposed class action suit demands damages from eBay

Load More