Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

black white hat

8 safari tips and tricks do a spotlight search in safari 8

Scammers scare iPhone users into paying to unlock not-really-locked Safari

Apple has patched a bug in the iOS version of Safari that was used by criminals to spook users into paying $125 or more because they thought the browser was broken.

apple watch

10 security risks of wearables

Fitness trackers may not present a huge security risk, but any connected device can be hacked. Here’s what you need to know to minimize those security and privacy threats.

privacy eye look

US House votes to undo broadband privacy rules

The U.S. House of Representatives has voted to repeal privacy rules that can prevent broadband providers from selling customers’ internet-browsing histories and other data without their permission.

fbi dhs

Feds to battle cybersecurity with analytics

With more real-time information sharing, officials envision cyber defenses moving from 'vaccine' to 'immune system,' a big analytics project that could achieve something like automatic security.

statue of liberty 359341

Expert: NY breach report highlights third-party risk

New York reported a record high number of breaches last year, just after a new set of cybersecurity regulations went into effect in the state.

healthcare data breach ts

FBI warns of attacks on anonymous FTP servers

The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information.

virtual reality robot

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks?

healthcare data breach ts

FBI warns of attacks on anonymous FTP servers

The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information.

Digital Key encryption

LastPass is scrambling to fix another serious vulnerability

Developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or to infect computers with malware.

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

smartphones 2013

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them.

icloud rain

Ignore that call from “Apple” about an iCloud breach

Scammers leverage an alleged iCloud account leak that also is likely not real.

hidden door

How to respond to device and software backdoors inserted or left by vendors

CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma.

1 intro visitor

Social engineering fake outs

Learn how a consultant infiltrated his client’s buildings and networks.

cloud architecture skyscrapers

Problems that arise with cloud to cloud interactions

Some companies have multiple applications in different public clouds. There is a possibility that some public cloud applications need to access another public cloud's application data. Should this architecture be allowed?

combat cyber crime ts

Continuous IT audits are needed to combat today's cyber threats

It's time to shift to continuous audits as cyber threats are dynamic and constantly changing, we can no longer afford to take a static snapshot of critical IT systems.

2 ransomware

If you think ransomware is a user failure, you’re a failure

It is easy to blame users for causing ransomware infections of their own systems. However, the reality is that for the user to infect their system, there are many technical failures, which are due to the IT staff’s actions or lack...

broken key

API flaws said to have left Symantec SSL certificates vulnerable to compromise

Over the weekend, Chris Byrne, an information security consultant and instructor for Cloud Harmonics, published a post to Facebook outlining a serious problem with the processes and third-party API used to deliver and manage Symantec...

Load More