Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

cybercrime
122214 passwords 1

122214 passwords 1

Old-school tricks to protect your passwords

If you’re caught in password purgatory, try these 6 old-school password tricks.

Exploits for dangerous network time protocol vulnerabilities can compromise systems

Systems administrators are urged to install critical patches that address remote code execution flaws in NTP

new years fireworks

5 lessons to help security pros craft a New Year’s resolution

2014 taught us a lot of hard lessons about data breaches, privacy and corporate security. As SANS' Dr. Eric Cole points out, there are a number of valuable take aways that security leaders can reflect on to make 2015 a better year

Trojan horse

Trojan program based on ZeuS targets 150 banks, can hijack webcams

The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs, researchers from Kaspersky Lab said

north korea 970x546

Questions remain after FBI charges North Korea with attack on Sony Pictures

The FBI formally accused North Korea of attacking Sony Pictures on Friday, citing three levels of evidence that has led to this conclusion. But does the FBI have it right, or are they missing the obvious?

North Korea

What we know about North Korea's cyberarmy

Snippets of information about the secretive regime's cyberops have leaked out over the years

holiday scam

Microsoft files suit against alleged tech support scammers

Over one-third of U.S. citizens contacted by scammers fall for the scam, according to Microsoft

vulnerability

Critical vulnerability in Git clients puts developers at risk

Malicious Git code repositories can execute rogue commands on client machines interacting with them

coolpad

Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices

Coolpad, the world's sixth largest smartphone manufacturer, installed a back door that allows the company to install applications, send alerts, and monitor communications without user knowledge or approval

point of sale credit card reader

Point-of-sale malware creators still in business with Spark, an Alina spinoff

Spark is installed by a script written in AutoIt and scrapes card data from the memory of POS terminals

smartphone encryption

Organized criminals targeting individual iPhone, Android users

A well organized criminal group is targeting both iOS and Android users with highly targeted man-in-the-middle attacks, according to a new threat advisory from Akamai Technologies

2014 biggest stories

Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014

The security of the web itself was tested in unprecedented ways in 2014--but the news isn't all bad.

business traveler airport

How to prevent theft, loss and snooping on the road

All your pricey electronics are juicy targets for hackers and sticky-fingered thieves. Here's how to reduce your risks while traveling.

the interview movie premiere

Setting the wrong precedent: Top theater chains drop Sony's 'The Interview' after threats

On Tuesday, the group responsible for the attacks on Sony Pictures made threats against the studio, and the theaters planning to show Sony's film, The Interview. Reacting to the message, Sony canceled press engagements with the film's...

security phishing

ICANN targeted by Spear Phishing attack, several systems impacted

ICANN posted details of a recent network intrusion on Tuesday, which originated from a Spear Phishing attack. Those responsible spoofed the ICANN domain, and fooled several employees into revealing their network credentials.

ransom note letters

New ransomware avoids hitting the same victim twice

A new strain of ransomware, OphionLocker, generates a unique hardware identifier for each new infected machine so that it can avoid hitting the same victim twice

security and privacy icon

The four Mac security options everyone should know

By default, the Mac is pretty secure. But with the help of a couple of built-in options, you can make it even more so. Topher Kessler explains.

the interview movie

Howard Stern is right: Journalists should do a gut check on Sony coverage

Some information behind the Sony breach is important and valuable. But is it ethical and necessary to publish the private details of emails, sales contracts and other privileged information that has been leaked in this breach?

Load More