Talk Security: Drupal Sites Compromised in October
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
746 articles
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
We’re taking a look at the security features in the new version of Mac OS X – Yosemite. Apple makes a decent effort.
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.
Hotels offer not just free WiFi but occasionally even free use of devices such as iPads these days. While it is really nice, a misconfigured device like this may store just a bit too much personal data, easily retrievable by the next visitor…
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
New research shows that studying and mnemonic devices could help us to better remember our passwords.
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.
A new poll shows Americans care overwhelmingly about digital privacy.
A number of popular Android applications are putting sensitive user data at risk of exposure because the app developers are not fully implementing encryption.
Like it or not, your children are going to be on the web. Kaspersky’s award-winning parental controls let you monitor their activity and block them from any sites that you choose.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
Tor is an online browsing portal that keeps your web activity completely anonymous.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?