As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their personal lives to their work lives.
With an emphasis on intuitive collaboration and enhanced productivity, initiatives such as BYOD encourage this sort of working behavior. From a security perspective however, it also heightens the level of risk in a company. In light of the changes to how we work, a new research conducted a global study which revealed the working habits of professionals around the world, and their attitudes towards online data protection.Read more
With Google processing 40,000 search queries a second — or 1.2 trillion a year — it's a safe bet that many of those doing the Googling are kids. Little surprise then that beginning next year the tech giant plans to create specific versions of its most popular products for those 12 and younger.
The most likely candidates are those that are already popular with a broad age group, such as search, YouTube and Chrome. Google would not offer a timetable for the rollout. Google wants to be thoughtful about what we do, giving parents the right tools to oversee their kids' use products. So the better approach is to simply see to it that the tech is used in a better way.Read more
It's easy to understand why privacy advocates and policymakers are sounding alarms about online privacy in general – and singling out Google in particular. If you use Google's search engine, Google knows what you searched for as well as your activity on partner Web sites that use its ad services.
The more Google knows about you, the more it can match you to an advertiser who thinks you are an ideal customer. Advertisers are willing to pay more for ads served to ideal potential customers. For instance, airlines want to target people who love to travel. Want to find out all the things Google knows about you? Here are 6 links that will show you some of the data Google has about you.Read more
Mobile security breaches have affected a lot of organizations in the last 12 months. Despite this, organizations are still not taking sufficient security measures to protect themselves against mobile threats, such as lost or stolen devices and malware infections.
Around half of respondents' organizations who had suffered a mobile security breach, experienced more than four incidents in the last year. The research explores the attitudes of IT decision makers towards security within their organizations. While some personal or corporate owned mobile devices have full access to the internal networks or contain sensitive client information, a third of organizations do not have any kind of enforceable mobile security policy.Read more
Apple issues a statement describing the restrictions it places on the collection of customer data. Responding to concerns that Apple was automatically collecting user location and search query data through its latest Mac operating system, the company issued a statement clarifying its customer data collection policies.
Customers began expressing privacy concerns about the revamped version of Spotlight search that was included in the release. The tool, which offers Google search suggestions, as well as its own Spotlight suggestions, raised the suspicion of users when Apple issued a warning on a support page.Read more
YouTube has become a daily habit for millions all over the world, but it looks like there has been some malicious activity on the website -- which may have affected more than 100,000 users over a 30 day period.
According to Trend Micro, they have been monitoring the activity on YouTube over the past couple of months and have found that the attack comes in the form of ads that are present on the site. While the ads themselves have no malicious content, the issue seems to occur when the ad is clicked. Although these ads should be monitored and screened by YouTube, some have seemed to slip through the cracks, redirecting to malicious websites that could cause infections.Read more
According to the research it was found that one in four installed applications is really safe and corresponds to all standards of data security. Gartner experts report that this situation will remain till at least 2015.
All companies should be on the alert, it is necessary to check the installed applications with special programs in order to avoid dangerous situations and data leaks. According to Gartner, in 2014 users around the world have installed about 139 billion applications on their devices, but in 2017 their number will be increased significantly.Read more
Malicious advertisements have popped up on websites such as YouTube, Amazon and Yahoo, part of a sophisticated campaign to spread malware, Cisco said Monday.
When encountered, the malicious advertisements cause a person to be redirected to a different website, which triggers a download based on whether the computer is running Windows or Apple’s OS X, wrote Armin Pelkmann, a threat researcher. The network has been nicknamed Kyle and Stan due to those names appearing in subdomains of more than 700 websites the attackers have set up to distribute the malware, Pelkmann wrote.Read more
Russian hackers were able to get access to the accounts of many users. Alexander Grebenshikov and Leo Loktionov, information security specialists told about the presence of a dangerous gap in the Yo messenger.
Experts said that if you update the account login application, the system sends a confirmation code to the mobile number by default, without making sure that it really belongs to the owner of the account. Information security experts explained that on the Yo Password Reset page, one may write any user‘s name and get a link to change the password, by using and entering your own phone number. Alexander Grebenshikov noticed this kind of vulnerability, while Leo Loktionov found a way with the help of which one may get account using the panel of service creators.Read more
Cryptolocker is being flogged over YouTube by vxers who have bought advertising space, researchers Vadim Kotov and Rahul Kashyap have found. The researchers made the discovery while monitoring YouTube and website banners for instances where malware writers had actually purchased space to foist their wares on unpatched web users.
The duo who will present at the upcoming Virus Bulletin 2014 conference in Seattle wrote in a paper advertisement networks was a viable way to flog virus and trojans.Read more
110 Reykjavik, Iceland