A long-overdue change
The Center for Digital Democracy has asked the FTC to investigate 30 U.S. firms' data collection practices, including Adobe, AOL and Datalogix.
This month's threat stats look into U.S. and international hackers' attack preferences. U.S. attackers favor the Allaple.A worm, whereas foreign hackers often harness the Zero Access trojan.
This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.
Phishing is all grown up and operated on a large-scale by well-funded cybercriminals who use botnets to harvest personal data and sell it on the black market.