Data privacy trends: Mining and socializing
2012 was a wild ride for cyber security and data privacy with no signs of reprieve as we slide into the New Year. So, how well did we do on our predictions from last year?
2012 was a wild ride for cyber security and data privacy with no signs of reprieve as we slide into the New Year. So, how well did we do on our predictions from last year?
As the threat landscape continues to evolve, enterprises must focus on employee training now more than ever.
For all of their bells and whistles, smartphones present real privacy concerns — some of which users aren’t aware.
Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.
HIPAA violations are becoming more common around the nation. To find the source of the problem you have to “follow the money.”
Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.
A 419 scammer who may have had one too many vodka martinis (shaken, not stirred).
The Anti-Phishing Working Group tells us that phishing is alive and well, but another report suggests that spear-phishing is even healthier – for the criminals, at least.
ESET research on malware that attacks 64-bit systems suggests a significant change in the way such malware is used and targeted
An individual has no intrinsic, inalienable right to leave his own system unprotected if by doing so he puts others at risk.