Most computers have some kind of security program or toolkit in an effort to help with data security and protection, but what happens when the software or manufacturer or this software becomes infected?
Read MoreBy TrendLabs Cybercriminals have been taking advantage of Facebook’s popularity ever since it became huge. Phishing scams, malicious spam, survey scams, profile hijackers – Facebook is one of cybercrime’s biggest and juiciest targets, and they’ve used it for every kind of lure imaginable. As such, you may have been suspicious if you got a legal…
Read MoreIn an effort to help increase mobile data protection, a CIO.com reports that one U.S. representative has proposed a new law that would allow users to ask apps to not collect their data and tell them to delete past information that has been collected.
Read MoreWhile fighting back against hackers and other cybercriminals trying to infiltrate a business may not be the best route, according to Michael Davis on InformationWeek, it is important for companies to be able to have a method of data protection in place that works well.
Read MoreBy Richard Medugno Okay, so if you haven’t heard about the Internet hoax involving the Notre Dame linebacker and Heisman Trophy finalist Manti Te’o , then you just haven’t been in America or you haven’t been paying attention. Here is a brief synopsis of the “scandal”. Manti fell for a girl he met online named…
Read MoreAny company that has large groups of employees has likely noticed, it is nearly essential to have a BYOD (Bring your own Device) policy in place, as people are bringing smartphones, tablets, e-readers and more to work every day now.
Read MoreTrend Micro recently released Repeating History and Evolved Threats in a “Post-PC” World, which examines the threats of the mobile landscape and beyond. These reports both showed that there are currently 350,000 mobile threats and that is expected to grow far beyond where it is.
Read MoreCompanies can work as hard as they want to protect Internet security, but outside flaws from programs could end up taking everything down within seconds. This is one issue companies need to look at with Oracle Corporation’s Java software, which was shown to have a flaw that caught the attention of the Department of Homeland Security.
Read MoreAn anonymous genealogy registry may not be as private as many had hoped, as Dan Vergano wrote on USA Today that a report has identified 12 percent of the men in this publicly available record of genes.
Read MoreBy Vic Hargrave There has been a lot discussion on the Internet recently about the Java 7 zero-day exploit, which has affected many computers worldwide. But what exactly is a zero-day exploit and how does it differ from other types of threats?
Read More