Data Protection

Data Protection news, information, and how-to advice


Heartbleed bled out and now, an arrest

The RCMP have managed to track down and arrest the first ne'er do well in London, Ontario. The RCMP have not indicated how they managed to puzzle out who attacked the Canada Revenue Agency. I am curious myself but, not for the same...

web security

Verizon breach report makes case for behavioral analytics

Verizon's annual data-breach investigations report makes a strong case for behavioral analytics technology that looks for anomalies among user activity to spot hackers.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.


Iowa State discloses data breach – attackers wanted to mine for coin

The IT staff at Iowa State University have disclosed a data breach involving five network-attached storage devices made by Synology on campus, which exposed 29,780 Social Security Numbers.

darknet2 primary 100049630 gallery

Merchants, buyers on Dark Web get their own search engine

A search engine for the Dark Web has been launched in beta to provide easier access to marketplaces selling illegal drugs and hacking tools and services

Phishing key

Four of the newest (and lowest) Social Engineering scams

Social engineering thugs have reached new lows, as gangs play on users’ fears of privacy loss, theft and even death.

heartbleed urges password resets due to Heartbleed

Officials are urging those with accounts on to reset their passwords due to the Heartbleed vulnerability.

Redefining Endpoint Security With Isolation Technology: An innovative, new security architecture

Find out how to secure your enterprise and empower your users to click on anything, anywhere without the fear of being compromised.

Cost of healthcare    167248933

Hundreds of medical professionals targeted in multi-state tax scam

Medical professionals in several states have come forward with reports of identity theft, after their personal information was used to file fraudulent tax returns.

Major security flaws threaten satellite communications

An analysis of satellite communication gear from more than a half-dozen major manufacturers has uncovered critical vulnerabilities that could be exploited to disrupt military operations and ship and aircraft communications.

DDoS Attackers Change Techniques To Wallop Sites

Criminals behind distributed denial of service attacks are relying less on traditional botnets and more on techniques capable of launching larger assaults on websites.

LaCie compromised for over a year

I guess there is truth in the saying that the devil is in the details. If anyone ever tries to tell you that their product or service is 100% secure you have my permission to smack them with a large fish (not an actual permission).

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

Download this complimentary report, featuring the Gartner Research "Designing an Adaptive Security Architecture for Protection From Advanced Attacks", and learn why organizations can't rely solely on traditional blocking

ssl secure browser lock

Bugcrowd launches funding drive to audit OpenSSL

Bugcrowd, the bug bounty marketplace driven by crowdsouring, has launched a donation campaign in order to help pay for a security audit of OpenSSL.

Small businesses could benefit from wireless industry 'kill switch' plans

Participants like Apple, AT&T, Google, and Verizon Wireless agree to provide "baseline anti-theft tool"

Can Heartbleed be used in DDoS attacks?

With nearly every major threat to information security, it is not long before security experts ask the question, "Can the threat play a role in distributed denial of service (DDoS) attacks?" When it comes to Heartbleed, some people...


Your no-fuss, fail-safe guide to protecting Android devices

As Android's popularity continues to climb, it's increasingly joining the workplace. In its early days, Android had little in the way of security, relegating it to personal use. But over the years, Google has upped the ante in terms...

Healthcare Information Management: A New Urgency

With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point.

In Depth

How a cyber cop patrols the underworld of e-commerce

Cyber "cop" for e-commerce platform Payza tracks illegal, unethical websites and works to put them out of business

3 ways to reduce BYOD legal liability with the right conversation

As "bring your own device" (BYOD) reshapes the way organizations handle technology, how do we handle the uncertainty of legal liability and security concerns? The key to turning a potential liability into an opportunity lies in having

Organizations suffer SQL Injection attacks, but do little to prevent them

Respondents taking part in a new study from the Ponemon Institute say they've had their eyes opened to the realities of SQL Injection, and the impact it has on their organization.

Black Hole Cygnus

Big data security context

Cyber attacks have greater range than a jet fighter or ICBM, regardless of whether they're perpetrated by nation-states, cyber criminals or activists. To address this issue, organizations are trying to optimize their use of big data...

Load More