Talk Security: ShellShock Bash Vulnerability Dominates September
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
698 articles
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.
A new poll shows Americans care overwhelmingly about digital privacy.
A number of popular Android applications are putting sensitive user data at risk of exposure because the app developers are not fully implementing encryption.
Like it or not, your children are going to be on the web. Kaspersky’s award-winning parental controls let you monitor their activity and block them from any sites that you choose.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
Tor is an online browsing portal that keeps your web activity completely anonymous.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
We have bought our very own Blackphone to check its security firsthand.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Yahoo plans to implement end-to-end encryption for all of its mail users, giving normal, non-technical users the power to communicate securely and privately.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.