Identity Finder Professional Edition is ideal for individuals and power users looking to protect their sensitive information on personal...
Showing results 1 to 20 of 49
Internet of Things devices are not originally built to be robust against attacks, resulting in vulnerabilities that can lead to severe repercussions if left unchecked, such as data that's being collected and acted upon in Singapore's smart nation plan.
The majority of dating apps have serious security vulnerabilities that put user data at risk. And because people are online dating at work, those risks are passed onto their employer.
The electronics retail giant published a more detailed timeline on Friday following an investigation that launched this fall.
UPDATED. I ran the numbers and vulnerabilities in browsers are up this year, as is their severity. We know more about this for Internet Explorer because Microsoft provides the most data.
Yet another failure to tell users directly about security vulnerabilities highlights the need not just for mandatory data breach notification laws, but mandatory notification of security and privacy risks.
VE-Disk is a small, compact program for creating encrypted virtual disks. It helps you keep your sensitive and vulnerable data and...
MS13-061, released on Tuesday to address 3 vulnerabilities in an Oracle component in Exchange Server, causes data to be inaccessible in Exchange Server 2013. Microsoft has pulled the update and released guidance for how to work around the problems it causes.
Most companies don't have a BYOD policy, and of those that do, a quarter give C-suite executives special treatment, according to a survey by data backup vendor Acronis.
Corporate data, supply chains remain vulnerable to cyber crime attacks, says Open Group conference speaker
The countries that are adept at cyber, but whose economies are relatively undeveloped compared to ours, are at a big advantage, because they're not very lucrative targets for this kind of thing, and we are.
Reporting of vulnerabilities and exploits essential to establish procedure consistency in security products as well as protect customers against cyberattacks, but companies that do so must practice discretion in data they divulge.
The handset manufacturer says the flaw, which appears to come from logging software HTC installs on its phones, will be fixed through an over-the-air update
Enisa, the EU's information security agency, has found 51 flaws in HTML 5 and other upcoming web standards that could let an attacker steal confidential information
Research in Motion (RIM) has shipped a patch to cover a serious security vulnerability that could allow attackers to read files that contain only printable characters on the BlackBerry Enterprise Server, including unencrypted text files.
The Victorian government's shared services agency CenITex has appointed Dimension Data (DiData) and McAfee to provide a threat and vulnerability management (TVM) product.
It has become known that sensitive data plugged into mobile apps are at risk. According to the computer security firm viaForensics, LinkedIn, Netflix, Foursquare and Square are the biggest culprits.
A whopping 99.7% of Android smartphones are leaking login data for Google services, and could allow other access to information stored in the cloud, so claim German security researchers Bastian Könings, Jens Nickels, and Florian Schaub from the University of Ulm.
The Australian Government has a list of software holes that are so sensitive they're kept hidden from the public. These weaknesses are being used by criminals to steal our money and our data. These vulnerabilities are also the bait with which cyber-criminals are caught.
Compared with Web servers, systems used to run mobile apps require more compute power and give users more access to previously off-limits data, notes security expert, who warns these developments open up more security vulnerabilities.
With 2010 all but behind us, we take a look at the year that was from the eye of best (or worst) data breaches, blitz attacks and plain stupid security.
There's a real danger that the focus of data leakage prevention has been too restricted and could leave firms vulnerable, says Rik Ferguson
Contradicting industry calls, a top information forensic specialist has said mandatory data breach legislation will not reduce the number of breaches.