25 “Worst Passwords” Of 2011 Revealed David Coursey Contributor Who Owns Your LinkedIn Contacts? David Coursey Contributor If you know me, you know I’m not really prone to spreading security FUD. I’ve been asked to prognosticate a bit about the near-term future, and I have to say, without intending to…
Top 5 mobile phone security threats in 2012
Experts share their 2012 mobile security threat predictions. <img alt="Top 5 mobile phone security threats in 2012, Blog, Security, threats, Mobile, phone, 2012."height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on SearchSecurity: Security Wire Daily News View full post on National Cyber Security
Students at Mt. SAC, Cal Poly learning to be cyberwarriors in war against international online threats
The U.S. Department of Defense recently opened a fifth domain for war, after land, air, sea, and space: cyberspace. View full post on china cyber wars – Yahoo! News Search Results View full post on National Cyber Security
Malware, lost or stolen devices top mobile phone security threats
With the exponential boom of those flocking to obtain the latest smartphone, experts say it’s only a matter of time before cybercriminals flock there as well. And they say the sophistication of the mobile phone security threats being launched that took decades for malware authors to achieve on the desktop…
Smartphone malware threats on the rise: report
(CBS News) A report from the computer security company McAfee finds that threats to your smartphone are on the rise and will reach a record high by the end of this year. According to the report, you are 76 percent more likely to have a malicious software attack, known as…
Android phone makers open up users to security threats
North Carolina State University researchers say some Android smartphone makers’ efforts to go above and beyond the Google mobile platform’s basics open their devices to security breaches. “Some of these preloaded applications, or features, are designed to make the smartphones more user-friendly, such as features that notify you of missed…
Mobile tracking vendor Carrier IQ drops legal threats
Software vendor Carrier IQ has withdrawn its threat to sue a security researcher for saying that its software helps phone companies surreptitiously track users of many popular mobile phones. Company CEO Larry Lenhart, also apologised to researcher Trevor Eckhart for making the threat and expressed his interest in having an…
HTCS1: Sarah Palin’s hacker is released from jail and the U.S. will respond to cyber threats. Listen to more at http://t.co/LTFdDEIN
HTCS1: Sarah Palin’s hacker is released from jail and the U.S. will respond to cyber threats. Listen to more at http://t.co/LTFdDEIN View full post on Twitter / HTCS1
McAfee: Android Phones on Top of Malware Hit List, Q3 Report Reveals Threats on the Rise
Like us on Facebook “So far this year, we’ve seen many interesting yet challenging trends that are affecting the threat landscape, including heightened levels of sophistication and high-profile hacktivist attacks,” said Vincent Weafer, Senior Vice President of McAfee Labs. McAfee predicted, at the end of 2010, that malware would touch…
Are Mobile Malware Threats Actually Real?
With the boom of mobile devices there is also an increase in malware attacks — according to several reports. The latest Juniper Networks report states that since July 2011, Android malware increased by 472%, partly because creating malicious apps for the Android platform is as easy as paying $25. “We…