Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

unit61398
goodwill industries thrift shop canton michigan

Apple tech note illuminates purported 'backdoor' services

The company's explained the purposes of three diagnostic tools that a security researcher claimed provided 'backdoor' access to users' information.

419scam

Nigerian scammers move from gullible consumers to businesses

Nigerian scammers known for grammatically challenged emails promising riches in return for a small up-front payment are moving into the business of launching malware attacks against companies

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

SQL injection flaw in Wall Street Journal database led to breach

The publisher said the intrusion did not affect customers' data

Tor Project working to fix weakness that can unmask users

The anonymity software's developers believe they've identified the problem

File-encrypting Android ransomware 'Simplocker' targets English-speaking users

The malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said

internet gavel keyboard

Duo sentenced to 14 years for Apple Phishing scheme

Two people have been sentenced to a total of 14 years in prison for conducting a Phishing campaign that targeted banking details. The criminals accused, Constanta Agrigoroaie, 23, and Radu Savoae, 28, used the stolen funds as a means...

Comprehensive Advanced Threat Defense

The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-­based approach to Advanced Threat Defense.

Dutch spy agencies can receive NSA data, court rules

Because raw data is shared in bulk, less stringent privacy safeguards apply, the court said

Apple “inadvertently admitted” to iOS backdoor: forensics expert

Apple has “inadvertently admitted” to creating a “backdoor” in iOS, according to a new post by a forensics scientist, iOS author and former hacker, who this week created a stir when he posted a presentation laying out his case.

Cybercrime wave whacks European banks

Banks across Europe are now coping with a wave of cybercrime in which crooks are transferring funds out of customer accounts through a scam involving bypassing some two-factor authentication systems to steal large sums, according to a

Goodwill

Goodwill Industries investigates suspected payment card breach

Federal authorities and payment card industry fraud units notified Goodwill on Friday

Advanced Threat Defense: A Comprehensive Approach

In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive approach to network advanced threat defense.

Researcher finds backdoors in Apple iOS

A number of undocumented features in iOS have been found to essentially create backdoors for siphoning large amounts of users' personal data from Apple devices.

knowledge is power 149148084

Misconceptions about targeted attacks

Trend Micro's Spencer Hsieh published a blog recently that caught my attention. It's focused on misconceptions surrounding targeted attacks. It's an interesting read, which I thought was worth sharing on Salted Hash.

snowden sxsw

NSA whistleblower Edward Snowden plans to work on easy-to-use privacy tools

Edward Snowden has some plans for the future and they include making privacy and encryption tools easier to use

stack of documents

Study examines the problems with metadata and file sharing

A study by Workshare, a company focused on secure file sharing applications, says that 68 percent of the 800 professionals surveyed failed to remove metadata before sharing documents. Due to this oversight, potentially sensitive...

Datacenter eGuide

Read on to learn what technologies are essential for high-performing data centers today, and to get a glimpse of what the data center of tomorrow may look like.

serverskulls header

URL redirect flaw on NBC News website a spammer's dream

A URL redirection flaw on the NBC News website could be used by scammers to give links a false sense of added trust. This is in addition to ongoing abuse of MSNBC's publicly available Bitly API key, which is being used in an active...

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

The Cryptolocker takedown led to a better designed, more resilient ransomware threat

cybergrowth

Cybercrime: still only a tiny percentage of GDP, but it’s growing

Cybercrime claims only a tiny slice of America's economy - less than 1%. But experts warn that it is growing fast. Worse, is that too many companies aren't taking even basic steps to reverse, or even slow the trend.

binary hard drive

CryptoWall blamed for possible data breach at Benjamin F. Edwards & Co.

Warning of a potential data breach, Benjamin F. Edwards & Co. (BFE) says that CryptoWall, a variant of CryptoLocker, infected an employee's computer on May 27.

Load More