Publishing firm says leaked Apple IDs came from their servers

Publishing firm says leaked Apple IDs came from their servers


Publishing firm says leaked Apple IDs came from their servers

Posted: 10 Sep 2012 12:48 PM PDT

BlueToad, a Florida-based digital edition publishing company, has announced that the recent massive Apple UDID leak originated from their own servers, and not an FBI laptop. They were first alerted...

Event: SANS London 2012

Posted: 10 Sep 2012 12:02 PM PDT

Europe's biggest and most important information security training event returns to London for 2012, and this year with a brand new central London location at the Grand Connaught Rooms in the heart of ...

Event: The Computer and Enterprise Investigations Conference (CEIC) 2013

Posted: 10 Sep 2012 09:24 AM PDT

CEIC is the premiere event for the exchange of best practices in Digital Investigations. At CEIC, attendees of all skills levels have the opportunity to choose from over 110 learning sessions to atten...

Pirate Bay's Svartholm arrested for hacking, not piracy

Posted: 10 Sep 2012 08:44 AM PDT

Well, as it turns out, the recent arrest of Pirate Bay co-founder Gottfrid Svartholm in Cambodia is a consequence of a "crime related to information technology," but it's not because he didn't present...

Windows 8 users open to Flash exploits

Posted: 10 Sep 2012 07:29 AM PDT

Users who have downloaded and are using the "Release To Manufacturing" version of Windows 8 or the 90-day trial version of Windows 8 Enterprise should be aware that the Adobe Flash Player version inte...

11,000 Guild Wars 2 accounts hacked in ongoing attacks

Posted: 10 Sep 2012 06:01 AM PDT

The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily targeted by what seems to be a d...

New program offers pathway into cyber security field

Posted: 10 Sep 2012 06:01 AM PDT

(ISC)2 launched the (ISC)2 Young Professionals, a new group designed to help cultivate the information security workforce of the future. The pilot stage of the program will begin with eight (ISC)2 ...

Who is the most dangerous cyber celebrity?

Posted: 10 Sep 2012 05:58 AM PDT

Emma Watson has replaced Heidi Klum as McAfee's 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular culture's most famous people to reveal the ri...

Apache HTTP Server set to ignore IE10's Do Not Track request

Posted: 10 Sep 2012 04:50 AM PDT

Microsoft's decision to make Internet Explorer 10 in Windows 8 have the "Do Not Track" (DNT) option turned on by default has stirred a heated discussion among browser developers, online analytics comp...

Mobile malware has become a profitable industry

Posted: 10 Sep 2012 02:33 AM PDT

Lookout released its State of Mobile Security Report 2012 which explains the issues that individuals faced on mobile devices this year and explores the prominent trends in mobile threats. Mobile ...

Data breaches expose 94 million records in the government sector

Posted: 10 Sep 2012 12:51 AM PDT

An analysis of government breach data shows that the government sector reported 268 incidents of data breaches from January 1, 2009 to May 31, 2012, which exposed more than 94 million records containi...

87% have something to hide on their smartphones

Posted: 10 Sep 2012 12:09 AM PDT

When it comes to the almost weekly reports of celebrity phone hackings and leaks, more than half of consumers believe these are merely stunts to garner publicity. In the end, however, these photo...

AlgoSec enhances firewall policy management suite

Posted: 09 Sep 2012 11:00 PM PDT

AlgoSec announced version 6.3 of its Security Management Suite, which simplifies the operational and security challenges of managing firewall policies. The suite pffers support for the Application ...

Microsoft Private Cloud Computing

Posted: 09 Sep 2012 10:00 PM PDT

Written by a team of expert authors who are MVPs and leaders in their respective fields, Microsoft Private Cloud Computing is an essential resource for IT administrators who are responsible for implem...

Week in review: 1m Apple IDs leaked, and Google hackers behind zero-day attacks

Posted: 09 Sep 2012 09:00 PM PDT

Here's an overview of some of last week's most interesting news, reviews and articles: The top Internet dangers for kids Data received from Kaspersky Security Network (KSN) show that alerts from...

0 comments:

Post a Comment