2 days ago Yet another way for criminals to screw usIT Toolbox Blogs View Synopsis+1
Fraudsters Tap Kohl?s Cash for Cold Cash
Documents obtained by the New York Civil Liberties Union (NYCLU) this month show that the New York Police Department used stingrays more than 1,000 times since 2008 without warrants.
300% better at it than non-business apps
Business apps for Android are three times more likely to leak login credentials than the average app, according to a new study by security firm NowSecure.
Researchers at security firm Trend Micro have found evidence suggesting that pieces of malware involved in the recent attacks against Ukraine's energy sector have been used to target other types of organizations as well.
But fear not - the taint has now been purged
Cybercrooks have been caught running booby-trapped ads on Skype to redirect users towards an Angler exploit kit trap.
18 hours ago Checklist for Assessing a DisasterIT Toolbox Blogs View Synopsis+1
The Business Continuity Plan needs to outline the steps and issues that ought to be considered when assessing the impact of a disaster. The Recovery Coordinator must be able to advise the Chief Executive and senior management teams on the impact of a...
A cybersecurity book and glossary for newbies and small business owners.
If you remotely administer Linux servers with the help of secure shell, grab the nearest Chromebook. Jack Wallen walks you through the steps of using ssh from Chrome OS.
British police said Friday they had arrested a teenager on hacking charges, as media reports said the youth was suspected of cracking the personal accounts of top US intelligence officials.
Adobe has stopped distribution of an update believed to be triggering the deletions.
1 day ago Friday Squid Blogging : Pajama SquidSchneier blog View Synopsis+1
The Monterey Bay Aquarium has a pajama squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
So that's that, then
Blighty's spying nerve center GCHQ has a license to hack computers and devices at will, a UK intelligence oversight court has ruled.
Change, convergence, complexity and convenience. These are words that describe the technology landscape as businesses look to create digital enterprises. Digital transformation, while not new, is evolving. Every part of a business is changing as a result of the rise of mobile, cloud computing, big data and analytics. In the [...]