security threats

security threats

BYOD Startup Skycure Inks $3M Seed Round With Israeli VC Pitango

techcrunch.com
With an estimated 65% of big global companies looking to implement Bring Your Own Device policies by the end of this yea, the BYOD market – which turns your chosen smartphone into a fire-walled enterprise device – is shaping up to be a big market. That spells enormous problems for...
BYOD Startup Skycure Inks $3M Seed Round With Israeli VC Pitango
TrustGo checks 1.7M apps on 175 app markets, finds 25,580 malicious apps (infographic)
Prepaid cards return to Google Wallet; Google apologizes with free $5 credit

IBM Takes a Big Data Approach to Security

bits.blogs.nytimes.com
Smartphones, cloud computing and the data explosion promise a revolution in communications, cost-savings and knowledge discovery. But those technology advances also open the door to a host of new security threats. I.B.M. is introducing new security products that rely on Big Data technology to tackle the data-security problem....
IBM Takes a Big Data Approach to Security

McAfee Finds Security Threats Increased In Mobile Devices By 440%

www.fastcompany.com
The number of new ransomware samples (the types of attacks that hold a victim's computer hostage) have slightly declined but are still at a high level. The number of threats on the internet are growing at an alarming rate, a report from McAfee Labs released today found. According to...
McAfee Finds Security Threats Increased In Mobile Devices By 440%

Supply chain 2013: Stop playing whack-a-mole with security threats

www.computerworld.com
IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats....
Supply chain 2013: Stop playing whack-a-mole with security threats

Weekly Poll: What is the Top Threat to Cloud Computing?

www.readwriteweb.com
The first peek at Apple's new data center stoked much of the interest in our poll last week. We asked: "Why is Apple building a massive, $1 billion data center?" A total of 1,456 people responded. This week is the RSA Conference, the largest security conference in the world. A...
Weekly Poll: What is the Top Threat to Cloud Computing?
Business Cloud Computing: Privacy Is Just As Important As Security

As OpenDNS focuses on security, investors offer a Series B

gigaom.com
OpenDNS, the domain-name-server-provider-turned-security-company, has raised an undisclosed second round of capital as a Series B, and added Stefan Dyckerhoff from Sutter Hill Ventures to its board. The company, which last year expanded from DNS services to providing security optimized for today’s cloud environment, has seen its customer base grow significantly...
As OpenDNS focuses on security, investors offer a Series B

Mobile security threats rise

www.pcworld.com
Digital crooks are turning to mobile malware, SMS spoofing, and worse as people move toward smartphones and tablets, according to a new report....
Mobile security threats rise

Malware, Phishing Gather in North America

www.pcworld.com
An annual review of global security threats identifies the U.S. and Canada as the primary source of malware attack focus....
Malware, Phishing Gather in North America
TSA to remove 'nude' body scanners from American airports

Banking Trojan breaks captcha to spread bot

www.zdnet.co.uk
The Cridex data-stealing Trojan is using spammer techniques to break captcha challenges to open webmail accounts and propagate itself, according to security company Websense(ZDNet UK - Security Threats)...
Banking Trojan breaks captcha to spread bot
White House advisers threaten a veto for CISPA, the controversial cyber security bill

Senate cybersecurity bill leaves Internet alone, exempts tech companies from oversight

arstechnica.com
The Senate Homeland Security Committee has introduced the broad cybersecurity legislation promised late last year by Senate majority leader Harry Reid (D-NV). But contrary to the fears of many—or perhaps because of them—the bill's scope is tightly restrained, excluding the vast majority of commercial systems and Internet infrastructure itself...
Senate cybersecurity bill leaves Internet alone, exempts tech companies from oversight

Nextdoor releases mobile app to strengthen communities using smartphones

venturebeat.com
July 9-10, 2013 San Francisco, CA Early Bird Tickets on Sale Nextdoor is going mobile. Today, the ‘private social network for neighborhoods’ released an iOS application so people can be connected to what’s going on in their community anytime, anywhere. Nextdoor raised $40 million in Februrary 2013 to accommodate...
Nextdoor releases mobile app to strengthen communities using smartphones
FCC releases online 'smartphone security checker' to help customers set passwords and back up data

UK planning 'Cyber Reserve' force

www.bbc.co.uk
The UK government is to set up a "Cyber Reserve" force to deal with security threats posed by computer crime....
UK planning 'Cyber Reserve' force

To Lock Down Mobile Apps, Cenzic Launches New App Testing Tools

techcrunch.com
Software and SaaS security company Cenzic is today launching a new security product for mobile application developers which will allow for the testing of mobile apps on any platform – iOS, Android, J2ME, and more. The product will be the first that can test products without requiring developers to submit...
To Lock Down Mobile Apps, Cenzic Launches New App Testing Tools

Cisco's John Stewart on the latest security threats and what enterprises can do to fight back

www.computerworld.com
Freelance writer Susan Perschke recently sat down with Cisco Vice President and Chief Security Officer John N. Stewart for an in-depth discussion of the state of enterprise security....
Cisco's John Stewart on the latest security threats and what enterprises can do to fight back

Don’t Use These Words Online Unless You’re Cool With the Government Spying on You

betabeat.com
Not all clouds are security threats. (flickr.com/kky) I exercised a lot on my trip to Mexico so I totally crashed when I got home. Oops, now the government is spying on Betabeat–at least according to this list of words the Department of Homeland Security uses to monitor social media, which was...
Don’t Use These Words Online Unless You’re Cool With the Government Spying on You

CloudFlare Wants to Make Your Site Look Like A Billion Bucks With Instaflare

techcrunch.com
When Facebook acquired Instagram for $1 billion earlier this month, quite a few pundits were left wondering if Facebook hadn’t overpaid for the photo-sharing service. Another company that is currently rumored to be raising funding at a $1 billion valuation is CloudFlare. The service, which promises to protect websites from...
CloudFlare Wants to Make Your Site Look Like A Billion Bucks With Instaflare

Zynga Spent More Than $1 Million To Protect Mark Pincus From His Creepy Stalker (ZNGA)

www.businessinsider.com
Remember Vera Svenchina? She was a Russian amateur film artist that was allegedly stalking Mark Pincus, founder and CEO of Zynga. Apparently that was enough to prompt Zynga to spend a ton of money ramping up the security for Pincus. (To be fair, it probably wasn't all a result of...
Zynga Spent More Than $1 Million To Protect Mark Pincus From His Creepy Stalker (ZNGA)

Why a Quarter-Million People Around the World May Lose the Internet Monday

allthingsd.com
Next week the Internet connections of about a quarter-million people will stop working because years ago their computers became infected with malware. The malware is being called DNSChanger and it was the centerpiece of an Internet crime spree that came to an end last November when the FBI arrested and...
Why a Quarter-Million People Around the World May Lose the Internet Monday

Researchers Say the Cloud Could Aid in Large-Scale Cyber Attacks

betabeat.com
Not all clouds are security threats. (flickr.com/kky) Researchers at North Carolina State University and the University of Oregon have discovered a way to turn cloud computing into hacker heaven. Utilizing the cloud-based processing that speeds up our mobile browsers, analysts found that these services could be tricked into assisting  password...
Researchers Say the Cloud Could Aid in Large-Scale Cyber Attacks

Will Your Next Car Steal Itself?

www.pcworld.com
As vehicles offer an ever-growing number of digital features, they could present several security threats--unless automakers manage these technologies effectively....
Will Your Next Car Steal Itself?
U.S. Government seeks spying tools for Facebook, Twitter

FAQ: What you need to know about Friday’s CISPA vote

paidcontent.org
The U.S. House of Representatives votes Friday on a major cyber-security bill that changes how companies like Facebook can share personal information. Privacy advocates are in uproar and the Obama Administration is threatening a veto. What’s going on? Here’s a plain English guide to the polices and politics driving the Cyber...
FAQ: What you need to know about Friday’s CISPA vote
Don't wait for lawmakers! Set up network security standards for the BYOD era now
Mobilisafe is Seamlessly Securing the Bring Your Own Device Market
× Just a test of the new info bar. What do you think?