SAN DIEGO–(BUSINESS WIRE)– ESET today announced that for the second straight year, Gartner has ranked the company as the security software vendor with the largest worldwide growth in consumer security. According to Gartner’s “Market Share: Security Software, Worldwide, 2011” report, which was released in late March 2012, ESET grew by…
ProtectMyID: #FTC releases top consumer complaints from 2011. For the 12th year in a row, #identitytheft complaints top the list. http://t.co/deTfatCd
ProtectMyID: #FTC releases top consumer complaints from 2011. For the 12th year in a row, #identitytheft complaints top the list. http://t.co/deTfatCd View full post on Twitter / ProtectMyID View full post on National Cyber Security
ProtectMyID: If you try to #unsubscribe from an email list and your request is not honored, file a complaint with the FTC. http://t.co/4kLhR0Ck #spam
ProtectMyID: If you try to #unsubscribe from an email list and your request is not honored, file a complaint with the FTC. http://t.co/4kLhR0Ck #spam View full post on Twitter / ProtectMyID View full post on National Cyber Security
Swedish hacker on FBI ‘most wanted’ list
A 33-year-old Swedish computer hacker wanted by the American FBI has been discovered living in Ängelholm, southern Sweden, yet Swedish police can only keep an eye on him. View full post on federal hacker – Yahoo! News Search Results View full post on National Cyber Security
With Leaner Military, Long List of Potential Threats
Panetta reveals his list of risks and most pressing threats to US security after announcement of defense cuts New Pentagon Plan Would Cut Ground Forces by 100,000 EXCLUSIVE: Failed English Class Set Off Afghan to Kill 9 Americans View full post on china cyber wars – Yahoo! News Search Results…
Top 10 list of common scams unveiled by BBB
Scammers are finding new ways to prey on unwary, according to the Better Business Bureau. View full post on email spoofing – Yahoo! News Search Results View full post on National Cyber Security
The FBI Releases a List of Common Passwords
This report, which is based upon information from law enforcement and complaints submitted to the IC3, details recent cyber crime trends, new twists to previously-existing cyber scams, and announcements. Popular Passwords An Internet site who manages passwords recently posted an article pertaining to the lack of secure passwords being utilized…
The Complete List of All the Phones With Carrier IQ Spyware Installed [Carrier Iq]
Responding to the US Senate request lead by Senator Al Franken, ATT, Sprint, HTC, and Samsung have sent the list of all the phones with Carrier IQ spyware installed in them. The carriers have also admitted that Carrier IQ also captured the content of text messages “under certain conditions.” Here’s…
How to keep Mac OS X’s safe downloads list up-to-date
Did you know that Mac OS X includes some very basic protection against malicious downloads? Learn the various methods to ensure that it is truly up-to-date, and what the difference is between it and more sophisticated anti-virus protection. View full post on Naked Security – Sophos View full post on…
HTCS1: Cyber security is at the top of Congress’ to-do list. Read more at http://t.co/wJp9QGJl
HTCS1: Cyber security is at the top of Congress’ to-do list. Read more at http://t.co/wJp9QGJl View full post on Twitter / HTCS1