Data Protection

Data protection news, software and solutions, and analysis for IT professionals

Data Protection Blogs

  • Dull-looking email from printer hides sophisticated malware

    Posted June 8, 2012 - 1:33 pm

    The more interesting a phishing email is the more end users will think about them and the more likely they are to become suspicious. A burst of spam from Russian malware servers disguises itself as the automated delivery of a scan, from a printer, not a person.
  • How many seconds would it take to break your password?

    Posted June 7, 2012 - 8:00 pm

    Want to know how strong your password is? Count the number of characters and the type and calculate it yourself. Or check this list and see how big a difference between a few billion possible combinations a few sextillion possibilities really is.
  • LinkedIn password cracker posted 8 million logins as cry for help

    Posted June 7, 2012 - 12:19 pm

    We've finally found a reason beyond simple profit that hackers post the private information (including logins) of consumers they don't know: to get help cracking the encryption on the passwords they've already stolen.
  • FBI, RIAA boost content pirates with moves intended to punish them

    Posted June 7, 2012 - 11:49 am

    Copyright enforcers keep contradicting themselves and each other with arguments defending their own behavior or sanctions that could actually benefit those they hope to punish. Foggy rules on what 'theft' is complicate things, but the real culprit is failure to substantiate.
  • Change your LinkedIn password right now

    Posted June 6, 2012 - 12:11 pm

    Login data for as many as 6.5 million LinkedIn users has been posted on a Russian hacker site. LinkedIn hasn't confirmed the breach, but Tweets confirm many real passwords are on the list. Change your password. Get a password vault. Use different passwords for important sites.
  • Facebook crushes hopes of critics

    Posted June 5, 2012 - 4:46 pm

    After weeks of stone-throwing over the questionable management, intentions, privacy violations and ultimate ickiness of Facebook, critics continue to work their arms, using ammo that keeps getting more and more insubstantial.
  • Cybercrime isn't where or who you think it is

    Posted June 5, 2012 - 2:40 pm

    The US and China are the most frequent victims of cybercrime, but also house the most frequent perpetrators as well. Yes, there's lots of cybercrime in Eastern Europe, and even a cybercrime-to-cybercrime market in Russia. But the story doesn't stop there.
  • 'Legitimate' cyberwar to make culture wars uglier

    Posted June 1, 2012 - 9:28 pm

    The admission that the US was behind cyberattacks on Iran legitimizes cyberwar for enemies of the US as well as its friends. More seriously, it makes an arsenal of semi-violent responses available to culture warriors who aren't satisfied with simply shouting at those who disagree.
  • U.S. admits cyberattacks on Iran, others

    Posted June 1, 2012 - 8:49 pm

    U.S. officials finally acknowledged a years-long cyberwar campaign against Iran and other countries according to the NYT. The admission is no surprise, but hearing cyberwar is a real option (and a real risk) gives hackers an overt place on the global stage for the first time.
  • Gartner: Bosses will spy on workers without demanding Facebook passwords

    Posted May 31, 2012 - 9:46 am

    Gartner published a report this week that looks like a warning that employers are too smart to continue demanding Facebook passwords. Instead they'll spy directly by searching social networks for employees' activity; Gartner's warning is a guide to how to do that legally.
  • Top malware threats: Not Flame

    Posted May 30, 2012 - 6:42 pm

    Flame, Stuxnet and Duqu get a lot of press and attract a lot of attention, but malware threats from the Android store, social networks and other transmission vectors are more dangerous to most of us. Narrow down your worries with this short list of the top 4 malware risks.
  • Mobile malware trick: Give users real apps, plus infection on the side

    Posted May 23, 2012 - 1:29 pm

    Unlike in most other malware markets, malware writers aiming at Android have always had a strong profit motive. Now they're going even more capitalist -- delivering the value they promised by wrapping good code in malware rather than just pretending
  • ownCloud: Universal access to local data

    Posted May 22, 2012 - 10:24 am

    Personal cloud storage is all the rage. But what if you don't want your data out in the cloud?
  • DEA wants to shoot every car passing through SW corner of Utah

    Posted May 21, 2012 - 4:46 pm

    If DEA gets its way it will be able to photograph, OCR and trace every license plate on every car that passes through the corner of Utah between Salt Lake and Vegas. Lawmakers worry about embarrassing constituents. They should worry about betraying them instead.
  • Courts quash copyright trolls; recognize IP address is not a person

    Posted May 16, 2012 - 2:35 pm

    A little technical understanding works wonders in court; even a very little bit, like knowing the difference between an IP address and a person, or that WLANs, poaching, wardriving and bad geolocation make accusations based on IP more random than righteous
  • Kaspersky doubles up slam at Apple, Mac OS X

    Posted May 14, 2012 - 9:11 pm

    Two Kaspersky Labs top execs publicly and explicitly slammed Apple for poor security in recent weeks as Apple customers go through the pain of growing into malware targets and Kaspersky makes a big push to round up new customers for its cloud security service. Apple users, maybe.
  • Science news: Chimps are mean, sneaky bastards

    Posted May 11, 2012 - 5:40 pm

    A chimp named Santino made news three years ago for gathering rocks in the morning to throw at humans in the afternoon. Now he's hiding the rocks and his own anger until it's time to whip out the rocks and have at the enemy, which dumb animals are not supposed to be able to do.
  • Tell PirateBay (and lawmakers) what you think about file sharing, piracy

    Posted May 9, 2012 - 12:19 pm

    The Pirate Bay is teaming up with Swedish researchers who specialize in copyright-, file-sharing and enforcement on survey designed to provide more objective data than that supplied by RIAA and MPAA to help counter rabid anti-piracy plunder-and-pillage copyright enforcement rules.
  • Ancient Microsoft Word malware threat returns from the grave

    Posted May 9, 2012 - 11:08 am

    The security patch Microsoft distributed yesterday included a comprehensive patch for the flaws exploited by Duqu; more interestingly, it also included fixes to keep poisoned .RTF files from exploiting same weakness as '90s-era Word Macro viruses.
  • Euro-virus extorts 'fines' from U.S. users with content-piracy accusations

    Posted May 9, 2012 - 10:42 am

    A technically savvy gang of East Europeans that has been extorting money from Europeans using 'Police Trojan' ransomware for two years is also responsible for the rush of ransomware in the U.S., after Americanizing its social engineering pitch, according to TrendMicro.
  • Anonymous will leak UFO data, or was trolled again

    Posted May 8, 2012 - 12:31 pm

    Anonymous is disavowing knowledge of a YouTube video warning the collective will leak proof that aliens visit Earth, which is funny, but is just one of a growing list of trolling incidents that hold Anonymous up to ridicule.
  • Google snooped your Wi-Fi, but FCC is more angry about the coverup

    Posted April 30, 2012 - 10:08 am

    Google's Wi-Fi snooping didn't break federal wiretap laws because StreetView cars weren't in range long enough. It did cover up like Watergate afterward, though, refusing to let employees testify, release emails or post FCC report to avoid admitting purposeful privacy invasion
  • Finding Anonymous in its own images

    Posted April 27, 2012 - 1:28 pm

    For all its influence, Anonymous is little understood, often even by other Anon. Its nature changes with each group of Anon and few perceptions agree. Many explain the Anonymous they see in pictures that illustrate what they do, why and who they see behind those masks.
  • Cloud services, recycled hard drives leak critical data; IT doesn't notice

    Posted April 26, 2012 - 3:34 pm

    Studies show a third to half of storage drives hold residual data from other users, much of it confidential, some of it enough to allow identity theft. Cloud services widen the hole by making it possible to leave lots of critical data behind with no chance to check whether you did or not.
  • Kaspersky warns Apple it needs to be more like Microsoft 10 years ago

    Posted April 26, 2012 - 12:04 pm

    Ten or 12 years ago Microsoft got its act together on security, churning out fixes quickly, taking aim at new malware and probing its own products for exploitable flaws. The founder of Kaspersky Labs warns Apple it must do the same or lose its market in a plague of malware.
Join us:






Data ProtectionWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question