Evaluating E-Mail Cloud Security from Microsoft and Google
Office 365 Vs. Google Apps: Top 10 Enterprise Concerns By Mathew J. SchwartzJune 29, 2011 04:52 PM Security remains a persistent question for potential cloud suite adopters, and with the debut of Microsoft Office 365 on Tuesday, one question from small and midsize businesses will no doubt be the cloud’s reliability and security track record, […] Continue Reading…
The Federal Bureau of Investigation seized over 40 computers and arrested two individuals to break up two separate scareware cyber-crime outfits.
Federal law enforcement agents have arrested members of two cyber-crime gangs who may have netted more than $74 million by infecting user computers with scareware and then charging for fake antivirus software. (Scareware generates pop-ups that imitate Windows System messages, and will usually advertise as a anti-virus software. They typically state that there is a […] Continue Reading…
Big Brother Camera Security Iphone App Is Watching you!
(Credit: Daniel Amitay) Apple has pulled a third-party application that was collecting user-submitted “lock-screen” passwords for what its creator: Daniel Amitay claims were research purposes. The software, dubbed “Big Brother Camera Security,” was created to serve as an alternative to Apple’s lock-screen security. Users could run it when leaving their iPhone or iPod Touch unattended, […] Continue Reading…
iPhones Tracking Your Location without Permission? Here Are Some Tools to Help…
By: Elinor Mills Want to wipe location-tracking data that’s being stored on your iPhone without your permission? There’s an app for that, but you’ve got to jailbreak your iPhone first. What is Jailbreaking? The process used to open the software of an iPhone, iTouch, or iPad, to allow the user greater access to the device […] Continue Reading…
Gmail’s Easy Access Password Breach!
Recently, Twitter suffered an embarrassment as a hacker obtained quite a bit of confidential information and passed it along to tech news sites. Apparently, the hacker accessed a Twitter employees’ Gmail account and used that to gain access to Google Docs, company systems, and more. Break into Gmail The employee most likely thought they had […] Continue Reading…