Get notified of suspicious Facebook access to your account

Get notified of suspicious Facebook access to your account


Get notified of suspicious Facebook access to your account

Posted: 22 Jul 2010 08:16 AM PDT

For all of you who haven't figured it out already, there is a simple way to make sure that if someone breaks into your Facebook account and misuses it, you know it immediately. All that's needed is a ...

The modern network security landscape

Posted: 22 Jul 2010 08:00 AM PDT

Businesses must change their mindset on security to help ensure that their networks and vital corporate information are protected from evolving security threats, according to a new Cisco report. ...

Secure by design

Posted: 22 Jul 2010 07:00 AM PDT

In this video recorded at the IBM Innovate 2010 conference, David Grant, the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread in a lot of innovations th...

Q&A: Sandbox for Adobe Reader

Posted: 22 Jul 2010 06:00 AM PDT

Didier Stevens is an IT security consultant well-known for his research into malicious PDF files. Since Adobe announced a sandbox for Adobe Reader, it was a perfect opportunity to hear his opinion on ...

Privacy worries make the E.U. limit use of citizens' personal data

Posted: 22 Jul 2010 04:48 AM PDT

The European Union has announced its plan to enforce stricter rules regarding its use of personal data of private citizens. "Citizens should have the right to know what personal data are kept and exch...

1.2 million infected by Eleonore exploits toolkit

Posted: 22 Jul 2010 01:27 AM PDT

AVG's Web security research team has discovered a network of 1.2 million malware-infected computers controlled by cybercriminals who were using the Eleonore exploit toolkit – a commercial attack softw...

Security risk tool for healthcare

Posted: 22 Jul 2010 01:12 AM PDT

Whenever there is a security breach of any size involving protected health information (PHI), the healthcare industry is now required under the HITECH Act to complete an incident-specific risk assessm...

0 comments:

Post a Comment