Last week’s data breach of patient health records at a military health care provider is a sign that major organizations are still not properly encrypting their data, despite compliance regulations. Tricare, a provider of health care services to active and retired military personnel, disclosed Sept. 29 that a third-party technology contractor had misplaced backup tapes […]
Senior corporate executives are largely unaware of how secure their data centers are, according to a recent report. Only 22 percent of data center managers surveyed in a report felt senior management is aware of the company’s security preparedness, according to a data center study from Gabriel Consulting released Oct. 3. There is a “serious […]
Facebook is partnering with Websense to protect users from clicking on links on the social networking site that may direct them to malicious Websites. When a user clicks on a link, Facebook will first check the link against Websense’s system to determine whether it’s safe, Websense said Oct. 3. If the link is identified as […]
Due to a flaw in how HTC devices log application data, any application that requests permission to get Internet access can read various phone data such as call and Short Message Service logs and a list of all user accounts saved, researchers found. The modifications HTC made in a version of the Android mobile operating […]
Government agencies and the private sector are coming under additional pressure to increase their vigilance and to implement new technologies to protect sensitive information and critical infrastructure. One of the prominent conclusions that emerged from the September National Security Agency (NSA) Trusted Computing Conference & Exposition in Orlando, Fla., was that Trusted Computing technologies would […]
Facebook dominatedthe privacy conversation this past week, as the social networking site rolled out a slew of new interface changes, including a real-time news ticker and Timeline information-sharing interface. Users complained about having their every move publicized to people they don’t know. Security experts warned that Timeline could be exploited by cyber-criminals to harvest personal […]
Identity and Access Management Control You need to know who is accessing your data, at what levels they can access it and whether they can alter it. This requires a clear, concise and auditable identity and access management control system that includes vendors, sub-contractors and your employees. ROI Cloud computing can yield a high security […]
IT professionals consider social media as a positive business tool within the enterprise, but they were concerned they didn’t have the right technology and policies to deal with the dangers, a recent report found. The “Global Survey on Social Media Risks” from the Ponemon Institute released Sept. 29 surveyed 4,640 IT and IT security practitioners […]
As Operation “Occupy Wall Street” moved into the second week, some protesters are moving their activities online. A group using the handle “CabinCr3w” posted personal information for Goldman Sachs CEO Lloyd Blankfein on the text-sharing site Pastebin on Sept. 28. The post included Blankfein’s age, recent addresses, details of litigation he has been involved in, […]
Days after wrapping up its civil case against the Rustock botnet, Microsoft is back in court, this time to shut down the Kelihos network. Using the same technique that had worked so well in its previous campaigns against the Rustock and Waledac, Microsoft asked the United States District Court for the Eastern District of Virginia […]