dcsimg

Most Recent Data Security

Does Second Smartphone Infection Indicate a Trend?

March 17, 2010 |
Twice in the span of about a week, traces of the Mariposa botnot were found in SD cards of HTC Magic phones. Panda Security's PandaResearch blog has been following this story closely, reporting that
READ MORE

The Need for Security in the Cloud Isn't One-Size-Fits-All

March 15, 2010 |
The rainy weather in the Northeast has me thinking about clouds -- or more specifically, cloud security.   At RSA 2010, IEEE and Cloud Security Alliance released a survey that looks at the
READ MORE

Securing the Mobile Office: Your Car

March 10, 2010 |
When I'm in my car, I like to listen to music and enjoy some "unplugged" time. I'm in the minority, I know. Our vehicles have become remote offices and today's cars are being equipped with the latest
READ MORE

How Bright Is the Future for IT Security Pros?

March 08, 2010 |
It's a career that looks like it should have a solid future, but instead, IT security professionals see a mixed job outlook.   Skeptics point out that IT opportunities in general are being
READ MORE

Is Twitter a Good Fit for Your Company?

March 04, 2010 |
I love this opening paragraph written by Neil Roiter for CIO.com: Businesses are still trying to figure out what to make of social networking. The knee-jerk impulse at some companies is to ban its
READ MORE

Just Because We Know About Zeus Doesn't Mean It's Easy to Eliminate

March 03, 2010 |
Last month I wrote about the Zeus Trojan and its infiltration of the banking industry. As I mentioned then, Zeus isn't a new virus, with activity going back a couple of years, but it was recently
READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS

Twitter Account Hacked? Let Your Customers Know

March 01, 2010 |
There's no doubting Twitter's and microblogging's growing role in the way we communicate. But there are plenty of kinks to be worked out. Twitter has been hacked and has crashed. Shortened URLs, a
READ MORE

Don't Get Spoofed

February 26, 2010 |
Cell phone spoofing isn't a new problem. It's where someone sends a text message from one phone and makes it look like it is from a phone you know -- phishing through SMS, if you will. It also can be
READ MORE

March 1 Deadline for Massachusetts Data-Security Law Looms

February 24, 2010 |
March 1 is days away. If you do business with people from Massachusetts, the month might arrive like a lion -- and not because of another Nor'easter. March 1 is the deadline date for a new state law
READ MORE

HHS Taking Steps to Prevent Breaches

February 23, 2010 |
Despite the HIPAA privacy law, despite increase awareness, and even despite all of the negative publicity generated from the Heartland situation, the health care industry continues to be victimized
READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS