2 days ago Yet another way for criminals to screw usIT Toolbox Blogs View Synopsis+1
Fraudsters Tap Kohl?s Cash for Cold Cash
Documents obtained by the New York Civil Liberties Union (NYCLU) this month show that the New York Police Department used stingrays more than 1,000 times since 2008 without warrants.
300% better at it than non-business apps
Business apps for Android are three times more likely to leak login credentials than the average app, according to a new study by security firm NowSecure.
Researchers at security firm Trend Micro have found evidence suggesting that pieces of malware involved in the recent attacks against Ukraine's energy sector have been used to target other types of organizations as well.
But fear not - the taint has now been purged
Cybercrooks have been caught running booby-trapped ads on Skype to redirect users towards an Angler exploit kit trap.
10 hours ago Checklist for Assessing a DisasterIT Toolbox Blogs View Synopsis+1
The Business Continuity Plan needs to outline the steps and issues that ought to be considered when assessing the impact of a disaster. The Recovery Coordinator must be able to advise the Chief Executive and senior management teams on the impact of a...
If you remotely administer Linux servers with the help of secure shell, grab the nearest Chromebook. Jack Wallen walks you through the steps of using ssh from Chrome OS.
Is cybersecurity still a hot market, or is it starting to cool down?
British police said Friday they had arrested a teenager on hacking charges, as media reports said the youth was suspected of cracking the personal accounts of top US intelligence officials.
By Pavel Polityuk KIEV (Reuters) - Hackers used a Russian-based internet provider and made phone calls from inside Russia as part of a coordinated cyber attack on Ukraine's power grid in December, Ukraine's energy ministry said on Friday. The incident was widely seen as the first known power outage caused by a cyber attack, and has prompted fears both within Ukraine and outside that other critical infrastructure could be vulnerable. The ministry, saying it had completed an investigation into the incident, did not accuse the Russian government directly of involvement in the attack, which knocked out electricity supplies to tens of thousands of customers in central and western Ukraine and prompted Kiev to review its cyber defenses.
US intelligence chief says the Internet of Things will create new opportunities for surveillance and hacking.
Researchers have uncovered ties between the attack against Sony in late 2014 and more recent hacks, suggesting the culprits are still active.
The post Evidence Suggests the Sony Hackers Are Alive and Well and Still Hacking appeared first on WIRED.
Mobile banking applications have become the front line for acquiring and retaining customers in the midst of competitive pressures. On the back end, IT organizations are constantly looking to modernize, rationalize, and consolidate their application portfolios to reduce costs and improve efficiencies. Private and public cloud onboarding has become a strategic, cost-effective initiative for many large banks, but securely migrating applications containing sensitive customer data is cost prohibitive. Aside from these impediments, financial institutions face heightened regulatory pressures and must invest in costly compliance programs. On the whole, these competing requirements compound the demands for data, making Data as a Service an integral component of any enterprise data management strategy.
In this webinar we will discuss:
- Current market trends and the importance of software innovation in the financial services industry;
- Technology debt and other impediments to developing applications that are critical to customer experience and competitive advantage;
- The advantages of using an integrated data masking and delivery solution to solve critical bottlenecks in the software development lifecycle;
- Case studies of financial services institutions that are using Data as a Service to accelerate application releases and unlock innovation.
1 day ago Fitbit Data Reveals PregnancySchneier blog View Synopsis+1
A man learned his wife was pregnant from her Fitbit data.
The details of the story are weird. The man posted the data to Reddit and asked for analysis help. But the point is that the data can reveal pregnancy, and this might not be something a person wants to tell a company who can sell that information for profit.
And remember, retailers want to know if one of their customers is pregnant.
Adobe has stopped distribution of an update believed to be triggering the deletions.
2 hours ago Third-party mainframe maintenance servicesIT Toolbox Blogs View Synopsis+1
Colin Fettes from Azamour Solutions took a look at alternative ways to source and support your mainframe infrastructure and examines its impact on your bottom line in this year?s Arcati Mainframe Yearbook.
According to definitions though, Two Speed IT and Bimodal IT appear to be the same concept for all intent and purpose.
The marketing cloud is used for online advertising and other solutions, but it?s not perfect. Here are five cloud aspects that need foolproofing.