| | | | Security Watch May 1, 2013 | | | | TOP STORIES Which Antivirus Is Best? When you spend your hard-earned cash on something, whether it's a brand-new hybrid auto or an antivirus utility for your computer, you want to make sure you're spending wisely. PCMag aims to help you decide with regularly updated reports on the best antivirus products. Share This: Two-Factor Authentication Wouldn't Have Prevented AP Twitter Hack From the land of "if only..." If the Associated Press had set up two-factor authentication with its Twitter account, then pro-Syrian hackers would not have been able to hijack the account and wreak havoc. Nice and tidy idea, but in reality, no. While two-factor authentication is a powerful tool for securing user accounts, it cannot solve all problems. Share This: LivingSocial Password Breach Affects 50 Million Accounts Cyber-attackers recently breached LivingSocial's systems and illegally accessed customer information for more than 50 million users, LivingSocial said. Users need to change their passwords immediately. Share This: Hit by LivingSocial Hack? Get a Password Manager Now! This past Friday, LivingSocial disclosed that an attacker gained access to over 50 million accounts. For users of the popular deals website, it's scary--even though the financial information remained secure and the passwords remain encrypted. But a password manager can make future attacks less likely and less damaging. Share This: Guardian Twitter Account Hacked by Syrian Activists The Syrian Electronic Army struck again over the weekend, hitting another media organization's Twitter account. The latest attack appears to be in retaliation against Twitter for suspending its account. Share This: Chinese Cyberattacks Skyrocket in 2012, But What Does it Mean? Each year Verizon releases its Data Breach Investigations Report, which chronicles an entire year's worth of investigations of the security incidents we know and love. This year, a large uptick in espionage attacks linked to China paints a scary, if somewhat warped, picture. Share This: Questions, comments, tips about potential viruses, worms, vulnerabilities? Send them here: | Featured Research | | | | Unified Mobility Download this white paper to learn what it takes to create a Unified Network for the Mobile Era. | | | | | Business Case for ERP Making the Business Case for Enterprise Resource Planning (ERP) | | | | | Uncomplicated BI Uncomplicating Business Intelligence for SMBs | | | | AWARD-WINNING TECH now on sale! |
| | | eNewsletter Information You are subscribed to PCMag.com's Security Watch with the email address pctipworld@gmail.com. Click here to unsubscribe from this newsletter. To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here. Copyright ©2013 Ziff Davis, Inc. All Rights Reserved. Ziff Davis, Inc., 28 East 28th Street, 11th Floor, New York, NY 10016 | |
ไม่มีความคิดเห็น:
แสดงความคิดเห็น