The European Network and Information Security Agency (ENISA) has published a report on ‘Cyber Incident Reporting in the EU’ and has found implementation gaps: “incidents remain undetected or not reported.”
Hacker collective leaks one million records, vows ‘hellfire’
Hacker collective Team GhostShell is boasting that it has breached more than one million user records from 100 corporate and public affairs websites across a variety of industry segments, and leaked them online.
Dropbox adds two-step authentication
File-sharing has long had a reputation for being a veritable petri dish for viruses and/or credential or identity theft, but web-storage and sharing provider Dropbox is now offering two-factor authentication to thwart would-be hackers.
Swiss Army knife USBs slash security features
Victorinox, maker of the Swiss Army knife, has abruptly discontinued its security offering for the Swiss Army-branded line of portable USB memory sticks.
Is use of the Find My iPad app actually trespassing?
In what many would consider a bizarre case in Australia, an accused man says the evidence against him was obtained illegally when an iPad owner electronically tracked a stolen iPad via GPS to his property.
California’s Location Privacy Bill passes Assembly
Senator Mark Leno’s SB 1434, the Location Privacy Bill, has been passed by the California Assembly with a bipartisan vote of 63-11. Having now passed both chambers of the state legislature, the bill is headed towards Governor Jerry Brown.
Google’s new cloud Wallet – is it secure?
Earlier this month Google made some fundamental changes to the way in which Google Wallet operates. The main difference is that the ‘active’ part of payment has been shifted from the handheld device to Google’s servers; that is, the cloud.
Steps To Increase Your Smartphone Security
This is a guest post by Lucille J Cronk.The increasing use of smartphones and the reliance placed on it by smartphone users has made them the targets of many malicious activities. Their enormous storage capacity has given relief to our brains in trying…
Is Your Mobile Device Hacker-Proof?
This is a guest post by Alyse.If it’s connected to the Internet, it can be hacked. For years, this was mainly a concern to PC users and IT guys, but anything that achieves mainstream usage and market share will eventually attract black hat types. From …
90% leading paid mobile apps have been hacked
Arxan’s new study shows that more than 90% of top paid mobile apps have been hacked. App developers need to take note of this, and defend their own market.