Data Security

Data security news, trends, analysis and practical advice

information security
data breach thinkstock

point of sale credit card reader

New malware program PoSeidon targets point-of-sale systems

Retailers beware: A new Trojan program targets point-of-sale (PoS) terminals, stealing payment card data that can then be abused by cybercriminals.

servers data center

Where’s the data?

The U.S. government wants access to an alleged drug dealer’s emails, but Microsoft says, sorry, they’re in Ireland and out of bounds. This is what happens when we apply non-digital rules to digital situations.

email not available

Don’t get into an email mess

Mixing together personal and work communications in one email account is bad for your employer, but also not great for you.

Hillary Clinton

Some email truths for Hillary Clinton

One thing she should know is that armed guards aren’t really equipped to stop a data breach.

dropbox android

Android app developers should update to Dropbox's latest SDK

A vulnerability could allow your Dropbox files to be uploaded to someone else's account.

data breach thinkstock

Mandarin Oriental removes malware after payment card breach

Luxury hotelier Mandarin Oriental has removed malicious software that was used to steal credit card data from some of its hotels in the U.S. and Europe, the company said.

us china flags

China defends cybersecurity demands, amid complaints from U.S.

President Obama is unhappy with new rules from China that would require U.S. tech companies to abide by strict cybersecurity measures, but on Tuesday the country was quick to defend the proposed regulations.

Revving up security illustration by Stephen Sauer [single use]

Your IT security infrastructure, rebooted for 2015

Cloud, mobile, social media and other factors are conspiring to force companies to reevaluate their security infrastructure, from firewalls to authentication.

data breach thinkstock

More than 1B records breached in 2014

In IT security, worst case scenarios became commonplace in 2014, and there’s no end in sight. Headline-making data breaches will likely continue into this year, as businesses, governments and regulators play catch-up to this threat.

malware shield prevent security virus warning

Critical vulnerability in Group Policy puts Windows computers at risk

Microsoft patched a critical vulnerability Tuesday that put Windows computers at risk of full compromise, especially those in corporate networks.

00 breach happens

Security Manager’s Journal: Breaches are everywhere

A look back at the top 20 data breaches of 2014 — over 450 million records compromised — points to the new normal.

security threat 100305038

Facebook builds platform for companies to share cybersecurity threat data

Facebook has built a platform where organizations can share information about the security threats they face in order to better fend off cyberattacks.

countdown

Five sneaky ways companies are changing employees’ security behavior

Like precocious teenagers, some employees don’t want to be told what to do when it comes to cyber security. Too many rules about what they can and cannot do with technology can lead to bad decisions that inadvertently put company data...

Advantech communication devices vulnerable to remote code execution

Industrial computer manufacturer Advantech fixed a critical vulnerability in a series of devices that handle data communication for industrial equipment with serial connections and TCP/IP networks.

sophisticated blogger

The ‘sophisticated attack’ myth

Every significant data compromise is said to be sophisticated. Well, sophisticated attacks are now average attacks. Deal with it.

US to form cybersecurity agency to combat online threats

The Obama administration will create a new agency to monitor cybersecurity threats and share data about possible attacks among government departments.

data breach lessons

Researcher releases 10M usernames, passwords from data breaches

A researcher has released 10 million usernames and passwords collected from data breaches over the last decade, a step he worries could be a legally murky but one that will help security research.

confide

Protect yourself from hackers and the NSA

Everybody's talking about hackers and the NSA stealing our data. Here's how to do something about it.

Load More