E-commerce fraud also spikes over the period as criminals target CNP transactions
Rights Groups Petition DoJ and FCC on Police Stingrays
Law enforcers should be forced to request warrant to use phone surveillance tech
IT Staff in One Third of Firms Share Passwords
Lieberman Software poll says IT pros have had enough of static credentials
AceDeceiver Tricks IPhones Into Installing Malicious Apps
It exploits Apple’s DRM, tricking iOS devices into believing that a malicious app was purchased by victim, allowing its installation.
AceDeceiver Tricks IPhones Into Installing Malicious Apps
It exploits Apple’s DRM, tricking iOS devices into believing that a malicious app was purchased by victim, allowing its installation.
Rights Groups Urge Privacy Shield Rethink
US law still seen as inadequate to protect EU citizens’ liberties
Celebgate iCloud Hacker Pleads Guilty
Pennsylvania man phished iCloud and Gmail log-ins
ISF’s Durbin: IoT, Government Intervention Are Top Future Security Challenges
Information Security Forum maintains government intervention one of three trends to affect quality of information over next two years.
Care.com Becomes the Latest W-2 Phishing Victim
A March 3 phishing attack targeted 2015 payroll data, containing names, addresses, social security numbers, and salary info.
Malvertising Exposes Millions of Site Visitors at BBC.com, NYTimes and More
A new rash of malicious ads on top publishing and media sites surreptitiously inflict ransomware on unsuspecting site visitors.