Facebook is alerting 6 million of its users that their e-mails or phone numbers were inadvertently shared with other members. So is it another reason to condemn social networking sites Continue reading “Another Social Network Glitch”
hypnosec writes “Knoppix 7.2 has been released for public testing — unlike its predecessor, Knoppix 7.1, which was only made available through the annual Linux Magazine CeBIT edition. Based on Debian “Wheezy”, Knoppix 7.2 packs quite a few new features, including newer desktop packages from Debian/testing and Debian/unstable Jessie. The latest version uses the Linux 3.9 kernel and xorg 7.7, and comes loaded with LibreOffice 4.0, GIMP 2.8, Chromium 27 (and Firefox/Iceweasel 21), Wine 1.5, and Virtualbox version 4.2.10. It uses LXDE by default. For users who still want to go for KDE or GNOME, version 4.8.4 and 3.4.2 of the respective desktops are available from the Knoppix DVD.”
Read more of this story at Slashdot.
Android: Instead of keeping a half-dozen apps on your phone to manage all of the free cloud storage you’ve signed up for, CloudCube is a single app that gives you complete control over all of them. The app supports two-way upload and download, automatic syncing, and more.
A new Ponemon Institute survey covers risk-based security management program governance and maturity and includes 571 U.K. and 749 U.S. respondents from the following areas: IT security, IT operations…
Canadian password security firm, PasswordBox, is bursting out of the gate today, coming out of private beta to hit the mainstream market. The company is hoping its mostly free, multi-device password management system will catch on with consumers beyond the 500,000 that have been using the service while it was in stealth development.
The CEO of the company, which was founded last year and has offices in San Francisco and Montreal, is Daniel Robichaud, a serial entrepreneur whose last venture, StreamTheWorld, was acquired by Triton Digital in 2009 for about $46 million.
Computer viruses do not discriminate. Malware prowling the cybersphere for bank information and passwords does not distinguish between a home computer or a hospital machine delivering therapy to a patient.
In this article we will try to understand what constitutes a data breach, what are the laws in various countries relating to data breach disclosures, what are the laws in various countries relating to data breach penalities, what are the prevalant regime of data breach penality in practice.
Continue reading “Understanding Data Breaches, notification laws and related penalities”
Potential threat: Malware will often slow down a computer, and when you slow down a medical device it no longer gives the integrity needed to perform as it should New York: So far, the idea of hacking into medical devices has been limited to fiction and hacker demonstrations.
The Pentagon has granted many exceptions, possibly numbering in the thousands, to allow staff members who administer secure computer networks to use flash drives and other portable storage devices, department spokesmen say. […] But officials say waivers go to people who update software and run helpdesk services for the Pentagon’s vast computer network and are needed to run the system efficiently.
Yeah, that’s a thing, apparently.
Researchers at Kaspersky Lab have reported significant growth in phishing attacks over the last year.
In a study entitled “The Evolution of Phishing Attacks”, Kaspersky said it found 37.3 million out of its 50 million customers running its security products that were at risk of being phished from 2012 to the present, an 87 percent increase over the same period between 2011 and 2012.