|
|  | Tools for the paranoid: 5 free security tools to protect your data 02.01.2013 3:30 AM Whether we work with trade secrets or just prefer to keep our stock trades secret, we all have data that's invaluable to us--and valuable to online evildoers. PCWorld reveals five free tools for protecting passwords, browsing anonymously, and encrypting our most precious documents. | |
|
|  | Google, Microsoft and others putting kibosh on phishing emails 02.06.2013 7:50 AM An estimated 60 percent of the world's email boxes are now safe | |
|
|  | IronKey Workspace, a Windows 8 PC on a stick: Hands-on 02.01.2013 10:20 AM This new IronKey USB drive lets you boot up an encryption-secured Windows 8 PC on any computer. | |
|
|  | FTC report suggests ways to improve mobile privacy 02.01.2013 11:52 AM A new Federal Trade Commission report recommends best practices for mobile operating systems, app developers, and ad networks. | |
|
|  | Obama to issue cybersecurity executive order this month 02.01.2013 2:15 PM President Barack Obama is expected to issue a cybersecurity executive order in the days after his Feb. 12 State of the Union address. | |
|
|  | Oracle rushes out another Java update, fixing 50 vulnerabilities 02.02.2013 11:25 AM Oracle says Java 7u13 addresses 50 flaws, many of which left systems vulnerable to remote exploits. | |
|
|  | 'Anonymous' hacker spared jail 02.02.2013 12:38 PM A British teen found guilty of attacking PayPal and other large companies as part of an Anonymous group cyber-campaign is too young and troubled to go to jail, a judge ruled, a week after sentencing other other hackers involved in the widespread denial-of-service attacks. | |
|
|  | Yahoo plugs hole that allowed hijacking of email accounts 02.03.2013 9:53 AM Hackers behind a recently detected email attack campaign exploited a vulnerability in a Yahoo website to hijack the email accounts of Yahoo users and use them for spam. | |
|
|  | Mobile apps should disclose privacy practices, FTC says 02.03.2013 11:46 AM Mobile app developers should provide real-time disclosures to users on the personal information they collect and get permission to collect sensitive information, the U.S. Federal Trade Commission has recommended. | |
|
|  | Lessons from the hack attack on The New York Times 02.03.2013 2:30 PM No single technology can combat a sophisticated attack like the one against the media company, say security experts, who recommend layers of protection and surveillance. | |
|
|
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.