You Are Here: Home » Posts tagged "security"

Security Has Reached Board-Level Thinking, Gartner Survey Finds

Some 71% of managers say IT risk management data influences decisions at the board level, according to Gartner's annual end-user survey for privacy and information security. Image source: Flickr The study’s authors found an increasing focus on IT risk as part of corporate governance. Almost 40% of respondents stated explicitly that the most senior person responsible for information security reports outside...

180 Million Windows XP Users Exposed to Threats as Microsoft Stops All Security Updates

Microsoft has announced that, as of July 15, all security solutions for XP users will stop receiving updates, leaving users exposed to threats. Windows XP will no longer provide the Malicious Software Removal Tool or updates to Microsoft Security Essentials. “Since real-time protection products have limited effectiveness on PCs that do not have the latest security updates, your PC will still be at risk of i...

MasterCard to Use Selfies to Ensure Safer Transactions

MasterCard is launching a pilot program to help shoppers improve the security of their transactions by taking photos of themselves, according to the company. The program focuses on biometric authentication, including methods such as facial identification, voice recognition and cardiac rhythm, through a wearable wristband. Source: Pixabay.com “The new generation, which is into selfies, I think they'll find i...

Twitter Aims for User Safety Via Mass Blocking

Twitter has introduced a feature that makes blocking multiple accounts easier as it works on additional user controls to boost security, according to the company. All Twitter users will be able to use the security settings in coming weeks. Twitter has already released mute, block and report features to improve user experience, but increasing volumes of unwanted interactions on Twitter required more sophisti...

iOS 9 Boosts Security with Six-Digit Passcode and Two-Factor Authentication

Apple’s iOS 9 will oblige users to strengthen the passcode that protects devices and improve two-factor authentication by building it directly into the operating system, making it harder for others to gain unauthorized access to Apple IDs, according to the company. Apple added two-step verification to some types of accounts in March 2013, but users could log in using their Apple ID only and with no second c...

Most Companies Don’t Know Where Their Sensitive Data Is

Some 64% of companies are uncertain about the location of their sensitive information, while more than half are worried about temporary worker or contractor mistakes with their data security, according to The State of Data Security Intelligence, a study by Ponemon Institute. The lack of knowledge regarding data (52%), third party or outsourced management of data (48%), and migration to new mobile platforms...

Seven out of 10 Cyberattacks Hack Websites Target Secondary Victims

Nearly 70% of cyber attacks target secondary victims, and not the owners of the hacked website, according to the 2015 Data Breach Investigations Report, an annual report by telecommunications company Verizon. The attackers hack websites then serve up malware to visitors, expecting that their true target will become infected. Hackers have no real interest in the owner of the website other than using him to f...

Eight out of 10 UK Businesses Report Information Security Breaches in 2014; Damage Triples

Some 82% of UK companies suffered an information security breach last year, and the damage inflicted by the worst breaches has more than doubled. The average cost of the most severe online security breaches for big business now start at £1.46 million, up from £600,000 in 2014, according to The Information Security Breaches Survey, an annual report by the British Department of Business (BIS) and big four acc...

Google Uses Fingerprint Scanners to Stay Secure On The New Android M

Android M, the newest version of Google’s software for gadgets, intends to increase security of mobile payments, the company informed on its annual developer conference in San Francisco. New measures such as fingerprint- and iris-authenticated money transfers are about to test the market. A new feature is that Android M users will be able to deny apps access to location, personal information and data on a c...

NSA’s Data Harvesting Policy Makes Foreign Governments Cautious Guarding Secrets

The Chinese Government intends to adopt a five-year cybersecurity program, part of a plan announced against cyber confrontation with the United States, while European decision makers are also reducing cooperation with NSA. China’s concern with cyber-security was given a powerful boost following the revelations of the former NSA contractor Edward Snowden about the universal surveillance capabilities of the U...

© 2012 Powered By Bitdefender

Scroll to top