TOP STORIES - April 7, 2011 | | | | | 11 Security Apps to Protect Your Smartphone With the recent rash of malware targeting mobile devices and with corporate data increasingly being stored on mobile devices, smartphone security has become critical. That has led to a growth of security products that offer remote find, block and wipe capabilities. Many of them also prevent thieves from swapping the SIM card out of the devices. We take a look at some mobile security apps across all the major platforms. READ MORE >> Epsilon Data Breach Highlights Cloud Security Concerns The theft of email addresses from Epsilon could affect consumer trust, and organizations have to reassess the risks of outsourcing less sensitive data and processes. READ MORE >> Sponsored by Hewlett-Packard The Best Social Network for Your Company Cameron Sturdevant, technical director eWeek Labs, explains how to pick the right social network for your company. Watch the Video! | | Attack Toolkits, Web Plug-ins Top Cyber-Weapons in 2010 Cyber-attackers shifted away from traditional methods to Web-based attacks in 2010 thanks to the proliferation of Web-based plug-ins and attack toolkits, according to a new security report compiled by Hewlett-Packard. READ MORE >> Conde Nast's $8M Spear Phishing Cautionary Tale A scammer managed to spear phish media giant Conde Nast and walk off with $8 million after he posed as a legitimate business. The incident is a timely reminder of how easy it is to fall for a scam. READ MORE >> Targeted Threats, Mobile Attacks Increased in 2010: Symantec Symantec detected more than 286 million malware threats last year. In its annual Internet Security Threat Report, the company found that threats are more sophisticated and targeted. READ MORE >> | |  | |
 | | |  | | | |
No comments:
Post a Comment