Is the US government helping cyber crooks?
/
0 Comments
As the U.S. government defends our interests and technology in the escalating global cyberwar, could it inadvertently be handing cyberweapons to criminals?
Hackers leak 1 million Apple device IDs
To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch's, all purportedly stolen from the FBI.
The SecurityOrb Show Aug 22, 2012
[soundcloud url="http://api.soundcloud.com/tracks/57366510" iframe="true"…
Vulnerabiltiy Management in the Cloud
Vulnerability management is a key component of a strong information security program. And that's making sure that with everything you're doing – in the cloud, on the desktop, browsers and server environments – you can reduce the vulnerabilities so that no matter what threats are out there, they are less likely to be successful.
Website “WeKnowYourHouse.com” Threats Your Privacy and Safety
A new website known as WeKnowYourHouse.com combinations tweets by users who write about being home and sifts through those posts to find ones that also include the users' location data. Having those two pieces of information, which are publicly available, the site also incorporates Google Streetview to post an image of the person's home.
