Information security digest: July 18 – August 18, 2013
Apple Developer Center down for a week It took Apple about a week to restore the functions of the Apple Developer Center following its crash on July 18. After about
Musician and technology enthusiast.
355 articles
Apple Developer Center down for a week It took Apple about a week to restore the functions of the Apple Developer Center following its crash on July 18. After about
Kaspersky Lab has published its report on the evolution of threats in the second quarter of 2013. This period has been marked with a number of security incidents of different
Using leased infrastructure for storing large amounts of data has been typical for several years. Leased capacities provide an advantage by allowing businesses to greatly reduce the cost of tending
Part two. The first part is available here. Risks associated with the vulnerabilities Bluebox reported that the vulnerabilities could be used to attain root rights in the system providing
The second half of July roused Android users as two very serious and unpleasant vulnerabilities were discovered. Researchers announced these so-called “master keys,” i.e. universal access to any Android device,
On July 31st at the Black Hat conference in Las Vegas, Security Research Lab’s (SRL) Karsten Nohl presented research on the SIM security flaw. Nohl experimentally demonstrated the vulnerability, which
Today the news of the hacking of resources at a major IT company does not really come as a surprise to anyone. Unfortunately, attacks like this now happen more often
Myths and prejudices are inevitable companions to any branch of knowledge, and the information security sphere is no exception, no matter how practical it is. This article will briefly touch
Dennis Technology Labs assessed our solution for corporate networks protection Kaspersky Endpoint Security for Windows as the best in its class. The testing was done by DTL in April-June 2013,
California Attorney General Kamala D. Harris recently published a report on data breaches in 2012. One might ask why the Attorney General is concerned with data security issues so much
Every fifth attack, every third bank Every fifth phishing attack over the past year focused on banking and financial institutions. These results come out of a study published by Kaspersky
In addition to the above examples, there were two other large scale and highly scandalous invasions in July and August of last year. The victims were users of the popular
Contemporary educational institutions in the US are now as computerized as any corporation or government agency and, in the case of technologically oriented universities, sometimes to an even greater extent.
Last week members of CMS Drupal received terrifying news regarding a very serious problem – a massive data breach. The breach included leaked usernames, email addresses, users’ countries of residence
On June 19, Opera Software, the developer of one of the most popular Internet browsers- mainly used on mobile devices, admitted that the company’s internal network infrastructure was attacked and
The large American supermarket chain, Raley’s Family of Fine Stores, which is comprised of 120 stores in California and Nevada, became the target of a “complex criminal cyber-attack.” The company
Imagine the following situation: there is huge disbursement of emails with innocent looking MS Word document attachments sent to the mailboxes of a company’s employees. Some of these employees have
Continued from Part I Smartphones and Tablets Smartphones and tablets are no different from PCs in terms of the amount of corporate data stored on them. E-mail access, corporate documents,
New technological business trends are almost always about investment. First you pay money and after that, if you get lucky, you make your employees happier, achieve tighter security of business