Most burglars spend less than six minutes inside a victim’s home and only have time to check the most obvious places for valuables. This unique “safe” allows you to hide your valuables discreetly inside what looks just like a surge protector- the last place a thief would think to look….
Frank Abagnale: Technology’s dark side – surge in con artists
Source: National Cyber Security – Produced By Gregory Evans The man who made $2.5 million in the 1960s as a teenager faking identities as an airline pilot, lawyer and doctor now works with the FBI and others on cybercrime. He even had a role in the investigation into last year’s…
Retail industry security hacks may surge in 2014
The massive security breach that hit Target over the holidays may be only the beginning for the retail industry. Attempts to hack into retailers’ computer networks and steal credit card data and other customer information are likely to surge this year, cyber security experts say in the wake of the…
Banks on the business end of DDoS attack surge – report
Shorter, bigger attack trend continues Financial firms were in the crosshairs of cyber-attackers during the first three months of 2012, while a threefold increase in DDoS attacks was recorded.… View full post on russia cyber attacks – Yahoo! News Search Results View full post on National Cyber Security
West Shore RCMP probe surge in credit card fraud
West Shore RCMP are in the middle of three fraud investigations following a spike in the last month in people using stolen credit card numbers to make purchases. View full post on credit card fraud – Yahoo! News Search Results View full post on National Cyber Security
Researchers Report Surge in Android Malware
Juniper Networks says the volume of Android malware has increased by 472 percent since July. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security
Android Threats Surge on Infected Apps
November 15, 2011, 11:28 AM EST By Sarah Frier Nov. 15 (Bloomberg) — In the era of the personal computer, Apple Inc.’s machines were often less vulnerable to security threats than the alternatives. That may also be the case with the rise of smartphones. Google Inc.’s Android operating system for…
Android security threats surge with infected ‘Angry Birds’
<!–Saxotech Paragraph Count: 1–> In the era of the personal computer, Apple Inc.’s machines were often less vulnerable to security threats than the alternatives. That may also be the case with the rise of smartphones. Google Inc.’s Android operating system for mobile devices has had an almost sixfold increase in…
Android Threats Surge With Third-Party Apps
Enlarge image Android Security Threats Surge With Infected ‘Angry Birds’ Jerome Favre/Bloomberg Models display Samsung Electronics Co. Galaxy Nexus smartphones, running Google Inc.’s Ice Cream Sandwich Android operating system, in Hong Kong, China. Making malware is easier with Android software because the applications aren’t checked, the source code is open…
Surge in attachment spam a sign of desperation, say experts
Botnet criminals have flooded the Internet with a surge of attachment spam in recent weeks in a desperate attempt to rebuild a spam-distribution industry under pressure, security experts have suggested. Although this surge has been widely reported as a significant return for spam generally, levels are in fact subdued. It…