Tag Archive for: report

IDG Contributor Network: Broad use of cloud services leaves enterprise data vulnerable to theft, report says

Data theft is a very real and growing threat for companies that increasingly use cloud services, says a security firm.

Workers who widely share documents stored in the cloud with clients, independent contractors, or even others within the company are creating a Swiss-cheese of security holes, a study by Blue Coat Systems has found.

In some cases, cloud documents were publicly discoverable through Google searches, the researchers say of their analysis.

‘Broadly shared’

The study found that 26% of documents stored in cloud apps are shared so widely that they pose a security risk. Compounding the issue is that many organizations arent even aware of it.

To read this article in full or to leave a comment, please click here

Network World Security

Follow-Up Report: Android Security Team Reacts To The Linux Kernel Flaw News – Droid Report


Droid Report

Follow-Up Report: Android Security Team Reacts To The Linux Kernel Flaw News
Droid Report
The fact remains that Google's Android Security Team was caught off guard, and the report of the flaw went to press before it could craft a more diplomatic response, or one that reassures the public that they're working on the task already. In any case
A Look at Linux, Android Zero-Days and the Perils of PatcheseWeek

all 4 news articles »

“android security” – read more

RAND Corp’s Report on Virtual Currency Calls for Cyberwarfare – newsBTC


newsBTC

RAND Corp's Report on Virtual Currency Calls for Cyberwarfare
newsBTC
The recently published report on virtual currency and non-state actors by the Department of Defense funded RAND Corporation could have been defined better. The report in its current form allows it to be interpreted in different ways, none positive

cyber warfare – read more

Hackers Focusing More On Apple Products Today [REPORT]

Microsoft Windows used to be hackers system of choice as far as developing new malware to attempt to break into networks and steal business and personal data. That has started to change in the last couple of years, however, as the number of people using …
mac hacker – read more