Your iPhone keeps an unencrypted record of your movements

Your iPhone keeps an unencrypted record of your movements


Your iPhone keeps an unencrypted record of your movements

Posted: 20 Apr 2011 10:56 AM PDT

If you are are owner of an iPhone or a 3G iPad, you'll probably want to know that your location - along with a timestamp - is at all times recorded by the device and stored into a file called "consoli...

Facebook announces two-factor authentication

Posted: 20 Apr 2011 07:36 AM PDT

Facebook will be rolling out the two-factor authentication option which, once turned on, will ask users to insert a code when they try to log into the social network from a new device. No details were...

Encrypted text messaging for BlackBerry and Android

Posted: 20 Apr 2011 06:30 AM PDT

ProtectedSMS enables BlackBerry and Android users to exchange secure, encrypted text messages with individuals who have installed the software. Unlike other secure texting solutions that require ...

U.S. federal lab linked to Stuxnet breached

Posted: 20 Apr 2011 06:18 AM PDT

A federally funded U.S. lab that is suspected to have been involved in finding the vulnerabilities in Siemens SCADA systems used by the Stuxnet worm has shut down the Internet connection for its emplo...

Michigan police downloading drivers' phone data without warrants?

Posted: 20 Apr 2011 05:32 AM PDT

For a few years now, the Michigan State Police has been using portable devices that allow them to secretly extract personal information from cell phones of drivers who have been pulled over. That...

Most employees would steal confidential company information

Posted: 20 Apr 2011 05:10 AM PDT

The majority of IT staff and C-level executives would definitely take confidential company information when they left their organization, according to Cyber-Ark. Despite 66% of respondents admittin...

Dramatic increase in cyberattacks on critical infrastructure

Posted: 20 Apr 2011 04:11 AM PDT

A survey of 200 IT security executives from critical electricity infrastructure enterprises in 14 countries found that 40 percent of executives believed that their industry's vulnerability had increas...

Regulatory compliance is a top concern in 2011

Posted: 20 Apr 2011 03:02 AM PDT

Regulatory compliance will be the top business issue affecting enterprise IT in the next 12 months, according to a new survey of more than 2,400 ISACA members from 126 countries. The survey found t...

Dimension Data partners with Qualys

Posted: 20 Apr 2011 02:35 AM PDT

Qualys announced that Dimension Data will offer the QualysGuard IT Security and Compliance Suite as part of its portfolio of solutions to organizations around the globe. As a QualysGuard Managed ...

Universal Fuzzer combines 15 different fuzzers

Posted: 20 Apr 2011 12:21 AM PDT

Codenomicon release its Universal Fuzzer, a fuzz testing solution that combines heuristics and multiple fuzzers with a graphical user interface, automated test executions and reporting features. ...

3TB hardware encrypted drive with PIN code access

Posted: 19 Apr 2011 11:36 PM PDT

iStorage released their Desktop Secure Hard Drive which comes with a robust, shock-proof design and 256-bit AES hardware encryption, which encrypts data on the fly as fast as any USB 3 hard drive. ...

Secure access for any device with Cisco

Posted: 19 Apr 2011 11:15 PM PDT

Cisco introduced new security, management, and video solutions to its Borderless Networks portfolio to help information technology departments more efficiently manage the proliferation of mobile devic...

0 comments:

Post a Comment