Play.com CEO responds to data breach coverage
Play.com’s chief executive has responded to reports about customer data being compromised via a third-party email marketing service.
More results...
Play.com’s chief executive has responded to reports about customer data being compromised via a third-party email marketing service.
Jesse William McGraw, also known as ‘Ghost Exodus’, has been sentenced to 110 months in a federal lock-up this week after pleading guilty to hacking the computer system of a Dallas-area medical complex.
Technology is starting to beat the theft of computing devices. Earlier this week we reported on the successful retrieval of a stolen iPad by an Israeli owner using the MobileMe location service, and now a tech-savvy teenager in the US has traced his Ap…
NetQin, a new Chinese mobile security firm, has been accused by several sources of installing viruses on users’ mobiles when they execute the company’s anti-malware software.
It appears that, within hours of the death of film star Dame Elizabeth Taylor being announced yesterday, cybercriminals were tapping in interest in her life – and death – by launching social engineering frauds on Twitter.
You’re probably familiar with the 3-D Secure system of card security for online transactions – aka Verified by Visa (for Visa) and SecureCode (for MasterCard) – but now a security researcher is reporting that cybercriminals may have found a way around …
A full 63% of US schools have suffered at least two information security breaches in the last year, according to a survey by Panda Security.
McAfee, which was itself recently acquired by Intel, has agreed to purchase Sentrigo, a Santa Clara, Calif.-based database security products firm, for an undisclosed consideration.
Tenable has updated its network security offerings to include what it claims to be world’s first real-time botnet scanning facility.
Peter Wood, a member of ISACA conference committee, has warned about the increasing use of personal email services for business purposes. The result of this type of usage, he says, is that it creates security issues such as a lack of data leak preventi…