| | | | Security Watch July 31, 2013 | | | | TOP STORIES How Not to Get Hacked at Black Hat and DefCon How is that for irony? Going to Black Hat and getting hacked? Here are some tips from our friends at Websense Security Labs and Qualys on how to make it hard for the hackers to make a fool out of you. Share This: Internet Explorer Protects Your Privacy Better than Chrome. Really! You can buy dozens of security products designed to protect your online privacy in dozens of different ways. Really, though, when it comes down to it, shouldn't privacy protection be built right into the browser? Truth to tell, the major browsers all have varying degrees of privacy protection built in, but some handle it better than others. Share This: 16 Years of Black Hat: The Changing Face of Cyberattacks This year marks the 16th anniversary of Black Hat, and to celebrate the security company Venafi released a report chronicling nearly two decades of cyberattacks. More than just a parade of malicious accomplishment, the Venafi report tells a remarkable story about the changing motivations and techniques of cyberattacks, and what it means for the future. Share This: Summer of Spam, or Why Over 25 Percent of Belarus's IP Addresses Are Being Blocked A new report from the Cloudmark security company has two big takeaways. First, that spam comes in waves, playing off popular terms that will appeal to victims. Second, that more than a quarter of Belarus' total IP space has been blocked for sending out spam. Wow. Share This: Apple Developer Portal Back Online, Partially Good news for Apple developers: The Apple Developer Portal is partially back online. Apple took the portal, used by developers who write applications for iPhones, iPads, and Macs, offline on July 18 without any explanation. A few days later, Apple said an intruder had "attempted to secure personal information" from the site. To "prevent a security threat like this from happening again," the company said it would be "completely overhauling our developer systems." Share This: Mobile Threat Monday: Watch Out for Stealthy Trojans, Leaky Apps This week's list of Android apps you probably don't want on your mobile device includes apps that collect your information and send them to remote servers. You may think leaking your email address is harmlessâ"but you should at least be aware of what data these apps are sending out. Share This: Keep up on all our Black Hat coverage from Vegas! SecurityWatch's reporters are at the biggest security conference to bring you the latest news on emerging threats. Share This: Questions, comments, tips about potential viruses, worms, vulnerabilities? Send them here: FEATURED OFFERS | | AWARD-WINNING TECH now on sale! |
| | | eNewsletter Information You are subscribed to PCMag.com's Security Watch with the email address pctipworld@gmail.com. Click here to unsubscribe from this newsletter. To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here. Copyright ©2013 Ziff Davis, Inc. All Rights Reserved. Ziff Davis, Inc., 28 East 28th Street, 11th Floor, New York, NY 10016 | |
ไม่มีความคิดเห็น:
แสดงความคิดเห็น