Yesterday, Zendesk was hacked and the personal information of an unknown number of Twitter, Pinterest, and Tumblr users was stolen. Last year, 12.6 million U.S adults were the victims of identity fraud.
A security breach at cloud-based customer support vendor Zendesk has exposed personal information including email addresses of Twitter, Pinterest, and Tumblr clients, the company said today in a blog post.
Jeep’s Twitter account recently told the world that the iconic brand had been “sold to Cadillac.” And Burger King’s account started mysteriously promoting McDonalds. Two high-profile hacks in less than a week means, apparently, that Twitter had to take some action.
The People’s Republic of China would like you to know that it had nothing to do with large scale cyberattacks against more than a hundred U.S. businesses, a government spokesperson stated in a news conference today.
Apple’s not invulnerable, after all.
People have health care, and now clouds have “cloud care.” The only difference? Cloud care is free.
Editor’s Pick Community news sharing site Reddit is the latest in a small (but growing) list of online services that are now accepting Bitcoin as a form of payment.
While congress has yet to reach any sort of lasting solution regarding the nations growing cyber security problems, President Barack Obama has decidedly taken the first big step in an executive order signed earlier today.
Rumors of CISPA’s demise were apparently greatly exaggerated, according to various privacy rights advocates and organizations today.
Adobe has issued an emergency fix to its Flash software, yet another incident where Flash shows vulnerabilities to hacks and exploits.
Guest Post Your kids love that new smartphone almost as much as the advertising networks who are tracking them using it. Here’s how to keep them safe.
Guest Post The process of implementing an American national identity card would be an expensive logistical and bureaucratic nightmare.
Guest Post With the government failing to create any sort of standardized security regulations, the private sector is left to wonder what level of network security will be best for protecting company and client data.
Apple is known for having relatively few massive bugs in its software, but that doesn’t mean bugs don’t exist.
Guest Post Social networks come and go. So what do you do with your data when the sun sets on one social graph and rises on another?
Just as Path was beginning to put last year’s controversy over its access to user address books, the social networking app is in hot water again over location data within images.
Guest Post Once your information is on the web, does it ever really go away?
The most trusted companies in America include HP, Amazon, IBM, eBay, and Microsoft. But Apple and Google, the two companies at the forefront of the mobile revolution, didn’t make the cut.
One Canadian computer science student has discovered the three simple steps to ruining your life.
If Google has its way, you could soon use an electronic ring rather than a password to login to websites.
Editor’s Pick “Prosecutors do not acknowledge nuance,” Watt told me today. “They turn everything into a very clear-cut moral issue, where everything is nicely packaged into a premeditated act.”
Editor’s Pick Security company FireEye raised $50 million today to prepare itself for an inevitable initial public offering.
Skype calls use 256-bit advanced encryption by default, but that’s not secure enough for some people. So a prof at the Warsaw University of Technology has created a way to communicate even more privately on Skype — by using silence.
Guest Post If there is any weakness in security, you can guarantee the criminals will try to exploit it. And if a cyber criminal discovers a weakness in one community, it won’t be long before that isolated crime turns into a trend. The commercialization of malware is rapidly becoming a well-organized and highly lucrative business.
It’s time to get your resolutions in for 2013 and while it’d be great to drink more water or get out for a run every morning, you should add getting security savvy to the list.
In Michigan, getting a hold of current and potential employees’ social media account information, just got a lot more difficult.
Guest Post Looking at the latest DDoS attack statistics from CloudFlare’s network, it seems that hackers love the holidays.
Samsung acknowledged today that the CPU used in many of its phones, including the massively popular Galaxy S III, is vulnerable to a particular type of hack that can give attackers full access to your phone.
The startup was formed by three chip and security companies.
Microsoft is investigating vulnerabilities in Internet Explorer that would allow hackers to potentially gain access to any private information you enter on-screen.
Internet “Explorer” has a whole new meaning today. The big question: who’s exploring who?
A Nokia engineer who has previously pointed out security holes in Microsoft’s Windows 8 has now posted a detailed step-by-step explanation of how to hack Windows 8 games.
Dropbox vice president Sujay Jaswa says people should think of Dropbox like the iPad: a technology that may have been aimed at consumers but wound up infiltrating the work world.
Editor’s Pick If you’re not using multi-factor authentication as a company or as a consumer, you really need to start. So say the cloud security geniuses at CloudBeat 2012.
The backdoor operates over SNMP, the simple network management protocol, and remains active even when SNMP is disabled.
Dave DeWalt — known for his big personality, top-secret government clearance, and work as former chief executive at McAfee — is taking over as chief executive for security company FireEye today. He hopes to lead the company to an IPO quickly.
Google Webmaster Tools, the Google site that helps website owners manage how their site appears in Google, diagnose problems, and optimize traffic, is currently experiencing a major security breach.
Guest Post In a field where handwriting notes on paper charts and managing large rooms filled with filing cabinets have been the accepted practices for decades, healthcare providers are being deluged by a perfect storm.
At CloudBeat, a panel of healthcare-technology experts will gather to discuss ways to improve security for cloud-based systems.