ITworld Data Protection http://www.itworld.com/taxonomy/term/19016/all en Michaels says breach at its stores affected nearly 3M payment cards http://www.itworld.com/security/415164/michaels-says-breach-its-stores-affected-nearly-3m-payment-cards About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.<p><a href="http://www.itworld.com/security/415164/michaels-says-breach-its-stores-affected-nearly-3m-payment-cards" target="_blank">read more</a></p> http://www.itworld.com/security/415164/michaels-says-breach-its-stores-affected-nearly-3m-payment-cards#comments Data Protection Security News Fri, 18 Apr 2014 03:05:27 +0000 IDGNS staff 415164 at http://www.itworld.com Netcraft tool flags websites affected by Heartbleed http://www.itworld.com/endpoint-security/415159/netcraft-tool-flags-websites-affected-heartbleed Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.<p><a href="http://www.itworld.com/endpoint-security/415159/netcraft-tool-flags-websites-affected-heartbleed" target="_blank">read more</a></p> http://www.itworld.com/endpoint-security/415159/netcraft-tool-flags-websites-affected-heartbleed#comments Data Protection Endpoint Security Security News Thu, 17 Apr 2014 20:33:13 +0000 IDGNS staff 415159 at http://www.itworld.com When it comes to Heartbleed, you can’t be too careful [CARTOON] http://www.itworld.com/security/415085/when-it-comes-heartbleed-you-can-t-be-too-careful-cartoon Sure, you’ve changed a bunch of passwords, but are you doing all you can to protect yourself?<p><a href="http://www.itworld.com/security/415085/when-it-comes-heartbleed-you-can-t-be-too-careful-cartoon" target="_blank">read more</a></p> http://www.itworld.com/security/415085/when-it-comes-heartbleed-you-can-t-be-too-careful-cartoon#comments Cloud Computing Data Protection Internet Offbeat Security Software News bed Business cartoon cloud comic computers couple cyberculture disguise heartbleed humor Internet jokes locks Mobile news passwords security social media starbucks technology web Fri, 18 Apr 2014 10:20:00 +0000 Phil Johnson 415085 at http://www.itworld.com Teen arrested in Heartbleed attack against Canadian tax site http://www.itworld.com/security/414985/teen-arrested-heartbleed-attack-against-canadian-tax-site Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.<p><a href="http://www.itworld.com/security/414985/teen-arrested-heartbleed-attack-against-canadian-tax-site" target="_blank">read more</a></p> http://www.itworld.com/security/414985/teen-arrested-heartbleed-attack-against-canadian-tax-site#comments Data Protection Security News Wed, 16 Apr 2014 23:31:23 +0000 IDGNS staff 414985 at http://www.itworld.com 9 things you need to know before you store data in the cloud http://www.itworld.com/data-protection/414957/9-things-you-need-know-you-store-data-cloud The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That&#039;s why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular.<p><a href="http://www.itworld.com/data-protection/414957/9-things-you-need-know-you-store-data-cloud" target="_blank">read more</a></p> http://www.itworld.com/data-protection/414957/9-things-you-need-know-you-store-data-cloud#comments Cloud Computing Data Protection Internet Networking Security News cloud storage Thu, 17 Apr 2014 01:15:33 +0000 IDGNS staff 414957 at http://www.itworld.com Lavaboom builds encrypted webmail service to resist snooping http://www.itworld.com/security/414928/lavaboom-builds-encrypted-webmail-service-resist-snooping A new webmail service called Lavaboom promises to provide easy-to-use email encryption without ever learning its users&#039; private encryption keys or message contents.<p><a href="http://www.itworld.com/security/414928/lavaboom-builds-encrypted-webmail-service-resist-snooping" target="_blank">read more</a></p> http://www.itworld.com/security/414928/lavaboom-builds-encrypted-webmail-service-resist-snooping#comments Data Protection Internet Networking On-demand Software Security Unified Communications News Wed, 16 Apr 2014 16:27:12 +0000 IDGNS staff 414928 at http://www.itworld.com LaCie warns hackers may have customer info, credit cards after year-long breach http://www.itworld.com/security/414906/lacie-warns-hackers-may-have-customer-info-credit-cards-after-year-long-breach For almost an entire year, malicious attackers may have been harvesting customer information including credit card data.<p><a href="http://www.itworld.com/security/414906/lacie-warns-hackers-may-have-customer-info-credit-cards-after-year-long-breach" target="_blank">read more</a></p> http://www.itworld.com/security/414906/lacie-warns-hackers-may-have-customer-info-credit-cards-after-year-long-breach#comments Data Protection Security News data breach LaCie Thu, 17 Apr 2014 01:40:16 +0000 IDGNS staff 414906 at http://www.itworld.com TrueCrypt source code audit finds no critical flaws or intentional backdoors http://www.itworld.com/endpoint-security/414718/truecrypt-source-code-audit-finds-no-critical-flaws-or-intentional-backdoor The source code of TrueCrypt, a popular disk encryption tool, is not the most polished work of programming, but it has no critical flaws or intentional backdoors, security testers concluded in a report released Monday.<p><a href="http://www.itworld.com/endpoint-security/414718/truecrypt-source-code-audit-finds-no-critical-flaws-or-intentional-backdoor" target="_blank">read more</a></p> http://www.itworld.com/endpoint-security/414718/truecrypt-source-code-audit-finds-no-critical-flaws-or-intentional-backdoor#comments Data Protection Endpoint Security Security News Tue, 15 Apr 2014 13:28:24 +0000 IDGNS staff 414718 at http://www.itworld.com Google said to be eyeing a boost to encrypted sites in search results http://www.itworld.com/internet/414555/google-said-be-eyeing-boost-encrypted-sites-search-results Websites that use encryption could be elevated in Google search results sometime in the future, according to The Wall Street Journal.<p><a href="http://www.itworld.com/internet/414555/google-said-be-eyeing-boost-encrypted-sites-search-results" target="_blank">read more</a></p> http://www.itworld.com/internet/414555/google-said-be-eyeing-boost-encrypted-sites-search-results#comments Data Protection Endpoint Security Internet Networking On-demand Software Security Unified Communications News Mon, 14 Apr 2014 17:57:09 +0000 IDGNS staff 414555 at http://www.itworld.com LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data <!--paging_filter--><p> Traditional backup is going away, but where does this leave end-users?</p> <p><a href="http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data" target="_blank">read more</a></p> Business Intelligence Data Protection Mon, 14 Apr 2014 15:15:31 +0000 414524 at http://www.itworld.com LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data <!--paging_filter--><p> Traditional backup is going away, but where does this leave end-users?</p> <p><a href="http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data" target="_blank">read more</a></p> Business Intelligence Data Protection Mon, 14 Apr 2014 15:15:31 +0000 414524 at http://www.itworld.com LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data <!--paging_filter--><p> Traditional backup is going away, but where does this leave end-users?</p> <p><a href="http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data" target="_blank">read more</a></p> Business Intelligence Data Protection Mon, 14 Apr 2014 15:15:31 +0000 414524 at http://www.itworld.com LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data <!--paging_filter--><p> Traditional backup is going away, but where does this leave end-users?</p> <p><a href="http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data" target="_blank">read more</a></p> Business Intelligence Data Protection Mon, 14 Apr 2014 15:15:31 +0000 414524 at http://www.itworld.com LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data <!--paging_filter--><p> Traditional backup is going away, but where does this leave end-users?</p> <p><a href="http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data" target="_blank">read more</a></p> Business Intelligence Data Protection Mon, 14 Apr 2014 15:15:31 +0000 414524 at http://www.itworld.com LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data <!--paging_filter--><p> Traditional backup is going away, but where does this leave end-users?</p> <p><a href="http://www.itworld.com/data-protection/414524/live-event-57-end-data-protection-we-know-it-introducing-next-generation-data" target="_blank">read more</a></p> Business Intelligence Data Protection Mon, 14 Apr 2014 15:15:31 +0000 414524 at http://www.itworld.com