Latest Posts | Page 139


No stranger to privacy issues, the search giant Google seems to have taken an even bigger page out of Facebook’s manual lately. And privacy advocates are revving their engines. Google's newly rewritten privacy policy, enacted Thursday, essentially aggregates all user data from its combined services into one uber database, with an objective to create more comprehensive—and much more detailed—user profiles that would help the search giant better target it ads, among other things. Altogether, the new privacy rules combine 60 out of over 70... [Read More]
by RSS Stefanie Hoffman  |  Mar 02, 2012  |  Filed in: Industry Trends
Tags:
Malware, like anything else, runs in cycles. And as of late, trends seem to be pointing to extortion as the latest developing theme. The ransom theme was given center stage April of last year after an attacker targeted Hyundai Capital's network in South Korea and swiped copious data belonging to more than 420,000 customers. The attacker demanded a ransom of several hundred million Korean won, which, if not paid, would trigger a release of confidential customer names, residence registration numbers, mobile phone numbers and e-mail addresses. The... [Read More]
by RSS Stefanie Hoffman  |  Mar 01, 2012  |  Filed in: Industry Trends
Tags:
RSA Conference is upon us once again. This year's RSA Conference is hosting around 350 exhibitors, and with the economy slowly on the mend, the show promises to have strong attendance, according to inside sources. In addition to the usual array of raffles, costumes, and “Wheel of Fortune” gameshow gimics, the show floor was abuzz with its own unique alphabet soup (e.g. BYOD, APTs) while mobile threats, securing the cloud and virtualized platforms, and targeted attacks became the topics_ du jour_. So what's all the rage in network security?... [Read More]
by RSS Stefanie Hoffman  |  Feb 29, 2012  |  Filed in: Industry Trends
Tags:
It's that time of year again. With less than two months to go before the April 15 tax deadline, scammers are in full swing, eager to separate taxpayers from their hard earned refunds. No doubt, scammers will pelt unsuspecting victims with a slew of social engineering ploys for bigger-than-expected or fast track refunds, official looking alerts warning users about tax complications, offers for some kind of “too-good-to-be-true” online tax deal or service, or e-mails impersonating the IRS in search of personally identifying information. This... [Read More]
by RSS Stefanie Hoffman  |  Feb 28, 2012  |  Filed in: Industry Trends
Tags:
This week, the issue of online data privacy received more than its fair share of attention. And with good reason. The Obama administration announced Thursday that it intended to place increased importance on online privacy with the proposed "Consumer Privacy Bill of Rights,” designed to give users a greater say in how their online information is handled, while establishing protections to prevent consumer data from being misused by businesses or advertisers. The proposed Bill of Rights—a collaborative effort to be spearheaded by the Commerce... [Read More]
by RSS Stefanie Hoffman  |  Feb 24, 2012  |  Filed in: Industry Trends
Tags:
The term "survival of the fittest" seems to be particularly apt when it comes to the Koobface worm. Over the years, the notorious social networking botnet has survived an almost unrelenting media spotlight, serial security improvements and even a massive international takedown, and has thus far managed to stay on its feet. And its adaptability could possibly bode well as it enters the next phase of its existence. The prolific botnet Koobface, the notorious anagram of Facebook, got its start hijacking social networking accounts via a myriad of social... [Read More]
by RSS Stefanie Hoffman  |  Feb 23, 2012  |  Filed in: Industry Trends
Tags:
More and more organizations are opening up their networks with invitations that say BYOD (bring your own device) and seeing everything from iPads to the latest Android gadget walk in their doors. And no one can deny that this trend is accelerating rapidly without any clear sign of stopping. According to a December 2011 Forrester Report, half of all US information workers pay for their smartphones and monthly plans, while three-quarters pick the platform of their choice rather than accept an IT standard issue device. For organizations, particularly... [Read More]
by RSS Stefanie Hoffman  |  Feb 21, 2012  |  Filed in: Industry Trends
Tags:
This week it's no secret that the Fortinet team that has been hitting it pretty hard on the Adobe front. For San Jose, Calif.-based Adobe, Valentine's Day came with a bang when researcher Honggang Ren of Fortinet's FortiGuard Labs detected a total of seven out of nine critical vulnerabilities in Adobe's Shockwave Player 11.6.3.633 (CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, CVE-2012-0766) and earlier versions for both Windows and Mac OS X. According to Ren, the memory corruption vulnerabilities were... [Read More]
by RSS Stefanie Hoffman  |  Feb 17, 2012  |  Filed in: Industry Trends
Tags:
These days, healthcare organizations have their hands full when it comes to compliance. In addition to adhering to a slew of industry regulations, such as HIPAA and HITECH, designed to protect patients' confidential information, medical facilities of all sizes are also facing increasingly stringent requirements from the Payment Card Industry Data Security Standard. That's right—PCI. PCI DSS, a series of 12 rigorous and detailed mandates governing customer data protection, applies to any organization that runs or processes credit card information—and... [Read More]
by RSS Stefanie Hoffman  |  Feb 16, 2012  |  Filed in: Industry Trends
Tags:
Black Hat Europe 2012 is now a month away, and this year, Fortinet researchers are taking their place among the headliners with three presentations in the lineup. “An Attacker's Day Into Virology: Human vs Computer" : What do influenza and the Conficker worm have in common? A lot. Fortinet researchers Axelle Apvrille and Guillaume Lovet will delve into these questions in their presentation with a deep comparison of technical and biological virology. During their discussion, the researchers will examine virus behaviors such as infection methods... [Read More]
by RSS Stefanie Hoffman  |  Feb 15, 2012  |  Filed in: Industry Trends
Tags: