Mobile malware surges this year, almost 700 percent over 2011 numbers

/
Mobile malware has exploded this year, growing almost 700 percent over 2011 numbers. Almost all of it, perhaps 85 percent, targets smartphones running Android.

Democrats push for open Internet, cybersecurity

/
Democrats late Sunday reiterated support for open Internet policies that protect free speech and consumer choice, stronger cybersecurity laws and the protection of movies and songs from online copyright violations.

How secure are you online? The checklist

/
Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. For the purpose of this post, we're breaking down online security into four essential parts: passwords, browsers, at-home Wi-Fi and networking, and browsing on public Wi-Fi. Within those categories we'll give you a checklist of everything you should do, from the bare minimum to the tin-foil-hat best.

Is the US government helping cyber crooks?

/
As the U.S. government defends our interests and technology in the escalating global cyberwar, could it inadvertently be handing cyberweapons to criminals?

Hackers leak 1 million Apple device IDs

/
To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch's, all purportedly stolen from the FBI.

The SecurityOrb Show Aug 22, 2012

/
[soundcloud url="http://api.soundcloud.com/tracks/57366510" iframe="true"…

Vulnerabiltiy Management in the Cloud

/
Vulnerability management is a key component of a strong information security program. And that's making sure that with everything you're doing – in the cloud, on the desktop, browsers and server environments – you can reduce the vulnerabilities so that no matter what threats are out there, they are less likely to be successful.

Website “WeKnowYourHouse.com” Threats Your Privacy and Safety

/
A new website known as WeKnowYourHouse.com combinations tweets by users who write about being home and sifts through those posts to find ones that also include the users' location data. Having those two pieces of information, which are publicly available, the site also incorporates Google Streetview to post an image of the person's home.

EC-Council TakeDownCon Online

/
Online TakeDownCon Live August 15 and afterward on…