![]()
Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.
|
Stopping the PhD Cybercriminal October 15, 2012
The concept of intelligent containment of risk is an important approach to overall IT security. In today's environment, rapid and proactive containment of problems and breaches -- in addition to just trying to keep the bad guys out of your systems -- makes sense. To find out what other approaches to data security are gaining traction, listen to today's podcast featuring Kaivan Rahbari, senior vice president of risk management at FIS Global.
|
Panetta Rattles Cybersword October 12, 2012
In a wide-ranging speech on cybersecurity, U.S. Secretary of Defense Leon Panetta on Thursday warned about a cyber Pearl Harbor, indicated the Department of Defense would respond in such a situation, called for greater public-private cooperation in cybersecurity, and talked about the need for a presidential executive order on cybersecurity.
|
|
OpenWorld's Missing Ingredient October 10, 2012
I went to Oracle OpenWorld as a guest of Oracle and came away with a variety of observations that I can share. Some of what I saw was under NDA and that will remain undisclosed, though I have to tell you that I did not see any labs or next-generation products beyond what my colleagues saw at the show. My secret experiences revolved around customer stories.
|
Big Businesses Walloped With Climbing Cybercrime Costs October 08, 2012
Cybercrime costs continued to climb in 2012 according to a report released Monday by the
Ponemon Institute. The study of 56 large organizations showed that the average annualized cost of cybercrime for the businesses was $8.9 million a year compared to $8.4 million a year ago. Losses for the firms ranged from one $1.4 million to $46 million. Cyberattacks have become common occurrences, said the study.
|
|
Facebook Scans Private Conversations to Pad Likes October 05, 2012
It isn't too hard to see what Facebook users Like, but on Thursday reports surfaced online about something few if any users would find likeable. It appears that sending links via private messages through the social network results in extra Likes for the link targets -- never mind that the link you're sharing may concern something you abhor. Call it a case of Like fraud.
|
FTC Slams Door on Tech Support Scammers October 03, 2012
The Federal Trade Commission has put a stop to a handful of tech-support scams based mainly in India that promised to remove viruses or other malware from users' computers. The scams primarily involved telemarketers contacting people in the United States and other English-speaking countries, falsely telling them that their computers were infected with malware and offering costly solutions to the nonexistent problems.
|
|
Apple Starts iPad Mini Production on the Sly October 03, 2012
Apple's Asian component suppliers reportedly have begun mass-producing parts for a new tablet, which is believed to be smaller, and with a lower resolution, than the latest iPad that went on sale last March. Last month, South Korean LG Display and Taiwanese AU Optronics reportedly began mass-producing LCD screens to be used on the new devices
|
Federal Grants Wed Public-Private Cybersecurity Efforts October 02, 2012
The debate in the U.S. Congress over a comprehensive national cybersecurity program is wearing on, largely because of differences over the roles of government and business in protecting information technology. Elsewhere, however, cybersecurity awareness and research projects are being launched through cooperative efforts.
|
|
Tizzy Over Bank Cyberattacks Unwarranted, Say Researchers October 01, 2012
A week-long cyber attack on some of the nation's largest banks last week most likely wasn't the Armageddon headline writers made it out to be. "It's ridiculous to consider an attack that takes your website offline for a few hours the world's worst nightmare scenario," said Jeffrey Carr, CEO of Taia Global and author of Inside Cyber Warfare: Mapping the Cyber Underworld.
|
FTC Wades Deeper Into Online Child Privacy Thicket September 28, 2012
The Federal Trade Commission is working on an update of the rules governing the online collection of personal information, which have remained pretty much the same since 1998. The changes to the Children's Online Privacy Protection Act, however, are likely to do as much to invade children's privacy as to protect it. The proposed changes have been debated since 2009.
|
|
Easing the Pain After a Security Breakdown September 28, 2012
With each major public data breach our attention focuses on how to prevent these incidents. A good example is the recent security breach at LinkedIn, in which millions of passwords were stolen. Industry experts and the media immediately started to dissect what LinkedIn had done wrong or what methods or tools should have been used to prevent the incident.
|
Report: The Internet Is a Language Killer September 27, 2012
A number of European languages could eventually vanish from the Internet, suggests a new study conducted by European nonprofit META-NET. Languages such as Icelandic, Latvian and Lithuanian don't have enough speakers to gain traction as popular languages on the Web. The report goes so far as to say that German, Italian, Spanish and French could be at risk, too.
|
|
Feds: New Rules Needed to Tighten IT Contractor Security September 26, 2012
The U.S. government is worried about the improper release of federal information that finds its way into the electronic IT systems of all federal contractors. In a recent notice, the government said it was seeking comment from the business community on a proposal to tighten security related to the transmission of "non-public" information.
|
EPIC Worries Facebook Could Follow You to the Mall September 25, 2012
Facebook came under fire again on Monday as a privacy advocate called for the Federal Trade Commission to investigate the social network's relationship with data marketer Datalogix. This wasn't just another instance of what have become typical privacy concerns with Facebook.
|
|
'Need it Here, Need It Now' Drives Capital Markets in the Cloud September 24, 2012
As an early adopter of innovative cloud delivery and a groundbreaking cloud business model, we decided to go back and see how things have progressed at NYSE. We will learn now, a year on, how NYSE's specialized cloud offerings have matured, how the business of the financial services industry has received them, and explore how providing cloud services as a business has evolved.
|
Cyberattack Warning Throws US Banks' Security Into High Gear September 21, 2012
Citing recent threats of cyberattacks, the Financial Services Information Sharing and Analysis Center, an industry body set up by the financial services industry, has raised its cyberthreat level from "elevated" to "high." It points to credible intelligence indicating the potential for distributed denial of service and other cyberattacks against financial institutions.
|
|
Cheat Fresh: Romanian Pair Cop to Subway Credit Card Hack September 20, 2012
Two Romanian men, ages 27 and 28, have pleaded guilty to a multimillion-dollar hacking scheme targeted at Subway restaurants. The two men, arrested last December, were part of what is believed to be a four-person group that stole information from an estimated 146,000 payment cards belonging to Subway customers.
|
IT Security Police: 'Step Away From That IE' September 19, 2012
Internet Explorer is too dangerous to use, according to warnings from throngs of security experts, including Germany's Federal Office for Information Security. The German government agency issued an alert that advises citizens to avoid using Internet Explorer and use an alternate browser until a patch can be found for a vulnerability discovered last week.
|
|
New Tool Verifies Authenticity of Gov't Social Media Sites September 14, 2012
Who doesn't stop twice to check out a letter from the Internal Revenue Service delivered in traditional snail mail paper form? Communications from the IRS or other federal agencies -- such as health information from the Centers for Disease Control, or consumer alerts from the Federal Trade Commission, are serious business.
|
Theft of Apple UDIDs Mitigated by News the FBI Didn't Have Them September 11, 2012
The case of the stolen database of Apple device identifiers is getting more intriguing by the day, with an entirely new player -- an app development company called "BlueToad" -- joining the cast of characters. BlueToad execs told reporters that the Apple UDIDs were stolen from it in a cyberattack launched two weeks ago.
|
See More Articles in Security Section >>


Headline Feeds




















