Security | News, how-tos, features, reviews, and videos
CIO.com blogger Constantine von Hoffman compiled and condensed all the painfully-obvious and self-serving 2013 cybersecurity-threat-prediction lists on the Web into a single tasty nugget.
What's in store for 2013? IT professionals need to be prepared for a mix of old (biometrics), new (3-D printing), borrowed (apps for watching TV) and blue (unemployed skeuomorphic designers).
This week's IT security roundup has stories on some not-so-smart Facebook hackers; malware that infected hundreds of PoS systems in 40 different countries; "Project Blitzkrieg;" and more.
Facebook cooperated with the FBI to nab crooks who infected 11 million computers and stole $850 million. The bad guys clearly forgot just how strongly Facebook feels about other people making money off of its users.
To reduce cyber risk, itu2019s important to invest in a combination of people, process, and technology to stay a step ahead of the bad actorsrn
Facebook is rolling out three changes to its privacy settings, activity log and photos. Here's what you need to know and how the updates to the social network affect you.
An information security officer recommends adding procedures for decommissioning devices to your BYOD policy before your BYOD employees upgrade to the latest smartphones and tablets this holiday season.
The FTC blasts app makers for misleading parents about their kids' privacy.
The upside for companies to protecting consumer data is practically nonexistent and the downside is barely any greater, according to CIO.com blogger Constantine von Hoffman. So why do organizations even bother?
A study performed by a North Caroline State University associate professor found third-party Android malware detectors to be significantly more effective than Google's new application verification service in Android v4.2 "Jelly Bean."
The executive order calls for the gathering of a lot of information that should have already been in it and it looks for "incentives" but no answers to the problems of businesses sharing cyber-threat data.
Sponsored Links