![]()
Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.
|
Dotcom Fights the Law With New Mega Site January 21, 2013
Kim Dotcom on Sunday opened the doors to the new file-sharing website Mega. The site is making a splash in the file-sharing world with its promise of exceptional privacy and security. That is not the only reason Mega's debut is notable, though: Dotcom is the founder of Megaupload, which was shut down by U.S. authorities following indictments for piracy against Dotcom and others.
|
Enterprise Security: No Perimeter Is Perfect January 21, 2013
Enterprises of all types are increasingly under attack by advanced persistent threats, which pose much greater danger than the lone hacker who just wants to use brute force to get in and deface their website. They are exploiting the disconnect between application security and perimeter security. The growing sophistication of intruders means they can gain access to an organization's entire infrastructure.
|
|
Facebook's Graph Search Turns Up Privacy Issues January 19, 2013
Facebook's introduction of Graph Search has been greeted with -- wait for it -- complaints about privacy. Graph Search is a feature Facebook introduced to allow users to enter parameter-based searches to find friends -- and friends of friends -- who share certain interests. A search for "friends who ski" or even more specifically "friends who ski in Arizona" will narrow the results within that field.
|
2 Buyers Shell Out $5K for Java Exploit January 17, 2013
An entrepreneurial hacker has found an exploit for a new zero-day vulnerability in Java and reportedly has sold it to at least two buyers at $5,000 a pop. News of the latest vulnerability follows on from a critical bug that emerged last week for which Oracle rushed out a fix over the weekend. The new zero-day exists in the patch Oracle rushed out, Java 7 Update 11, the seller claimed.
|
|
2012's Most Notable Computer Crimes January 16, 2013
Users of the Internet and electronic gear are vulnerable to criminals near and far, but we don't always hear about what happens at court and whether the alleged criminals are convicted or acquitted. Here is an update on some those crimes for consideration. After an 11-day jury trial in Denver, members of the management of Executive Recycling were convicted of illegally disposing of e-waste overseas.
|
DeleteMe Mobile App Helps Keep Data Brokers at Bay January 15, 2013
Data brokers are watching your every move online. They track the sites
you visit, articles you read, purchases you make, and even the names of
your children.To cut through the red tape of monitoring and removing
stored information, online privacy company Abine is offering a mobile version of its DeleteMe monitoring service, which is available for devices running iOS.
|
|
Why Bad Security Can Happen to Good People January 15, 2013
Sometimes you can do everything right and still run into trouble. To see this in action, pay attention the next time you're driving at dusk -- for example during an evening commute, if you have one. If you do this, chances are good that you'll notice at least one person with their headlights turned off. It's not that they're doing anything malicious.
|
Oracle's Java Fix Fizzles January 14, 2013
Oracle released a fix over the weekend for two serious vulnerabilities in Java, but this doesn't seem to have improved matters much. The vulnerabilities, which affect Web browsers using Java 7 plugins, let attackers remotely exploit target systems without needing a username or password.
|
|
100 Million Systems Vulnerable to Java Flaw January 14, 2013
A zero-day flaw in Oracle's Java programming language could make as many as 100 million computers connected to the Internet vulnerable to attack by cybercriminals. The threat posed by the Java vulnerability was considered so serious that the U.S. Department of Homeland Security urged computer users to turn off Java on their machines.
|
Jettisoning Java: Damned if You Do, Damned if You Don't January 12, 2013
DHS is urging computer users to disable or uninstall Java due to a serious flaw in JRE 7. The DHS' Computer Emergency Readiness Team warned Thursday evening that it was being exploited in the wild and could allow an attacker to execute arbitrary code on vulnerable systems. CERT recommended that Java be disabled in Web browsers.
|
|
The Perils of Cloud Computing January 10, 2013
The cloud may be the future, but it's not a bed of roses. The Amazon Cloud had a meltdown on Christmas Eve, affecting many customers who use the service. Companies that use Amazon as their cloud, their customers and workers were all affected. What should we learn from this high-profile meltdown?
|
Federal Agencies Face Mobile Tech Catch-22 January 08, 2013
The fast pace of mobile technology development can improve the ways we share information almost overnight, with new applications and more powerful devices rolling out on a regular basis. Federal agencies are trying to keep up with the times and have solidly embraced mobile IT but are stymied by having to meet federal operational requirements..
|
|
Bogus Google Certificate Exposes Broader Problem January 07, 2013
Google spotted an impostor certificate on Christmas Eve and took quick action, but the event is calling into question the reliability of Secure Socket Layer security. Turktrust, a Turkish Web certificate authority, acknowledged it gave two entities the power to create certificates when it shouldn't have.
|
Besieged Bank Clues In Customers About Disrupted Service January 07, 2013
PNC Bank took an unusually open approach with its customers recently. It sent a letter apologizing for any inconvenience they might have experienced recently when the bank was battling denial of service attacks assumed to have been launched by the hacktivist group Izz ad-Din al-Qassam Cyber Fighters.
|
|
Those Spicy Snapchat Vids Don't Self-Destruct December 28, 2012
So you thought those photos and videos you sent using Snapchat or Poke -- you know, the embarrassing ones -- were supposed to self-destruct after being viewed by the intended recipient? Not so fast. It turns out that there's a way to save them that doesn't require a lot of skill or expense.
|
Bill Loosens Rules for Sharing What You've Watched on Netflix December 28, 2012
Legislation that would allow services such as Netflix to facilitate "frictionless sharing" of a user's viewing history via Facebook or other online services is awaiting President Obama's signature. The U.S. Senate passed the update to the 1988 law late last week; the same bill cleared the House days earlier.
|
|
Mad-as-Hell Instagram User Takes Fight to Court December 27, 2012
An Instagram user has filed a proposed class action lawsuit against the company, alleging breach of contract and other violations. The suit claims that Instagram's "unilateral" changes to its terms of use transfer "valuable property rights to Instagram while simultaneously relieving Instagram from any liability for commercially exploiting customers' photographs and artistic content."
|
China Doubles Down on Real-Name Web Registration December 26, 2012
The Great Firewall of China might start requiring ID for admittance. On Monday, China's National People's Congress began discussing a draft decision that would force Internet users to use their real names in order to register for services. The draft decision is, depending on your perspective, a way to protect personal information online, or yet another move by China to restrict freedom of information.
|
|
Google Feeds More Personal Data Into Search Trials December 21, 2012
Google is a company that's always in Beta, goes the joke, but there's some truth to it. The company began its latest search field trial a few months ago, and it just added a few new capabilities to make it more interesting: the ability to search for personal information stored in Gmail and Google Drive, such as reservations, recent purchases and package tracking.
|
SMBs Can Be More Secure With Cloud, Virtualization, BYOD December 21, 2012
If you're a technology professional in a small or mid-sized business, chances are pretty good that information security is something you've had on your radar for quite a while now. In a smaller shop, this is usually out of necessity. As well all know, SMBs usually don't have the luxury of an expansive technology budget that would allow for extensive resource specialization.
|
See More Articles in Security Section >>


Headline Feeds





















