Security

 

  • CloudAlloy Makes Docs In The Cloud More Secure By Breaking Them Into Pieces

    CloudAlloy Makes Docs In The Cloud More Secure By Breaking Them Into Pieces

    One of the key issues facing companies when they put their content in the cloud is security, but what if you could send your documents to the cloud without security concerns? CloudAlloy, a company displaying at the Startup Alley at TechCrunch Disrupt this week, breaks your documents into pieces, spreading them across the cloud services and putting them back together whenever you call the document. Read More

  • Authy Raises $2.3M To Help Prevent The Next Celebrity Hack

    Authy Raises $2.3M To Help Prevent The Next Celebrity Hack

    Hacking into poorly secured online accounts isn’t all that hard, as a few celebrities found out this week. One of the easiest ways to secure your accounts is by using two-factor authentication so that you have both something you know (your password) and something you have (the second, ever-changing security PIN). Authy, a Y Combinator-funded startup that specializes in two-factor… Read More

  • Why Breach Detection Is Your New Must-Have, Cyber Security Tool

    Why Breach Detection Is Your New Must-Have, Cyber Security Tool

    Cyber attacks are all over the news, and it seems like no one is immune — Home Depot, Target, Adobe and eBay included. So why are CIOs still fighting cyber criminals with one hand tied behind their backs? Shockingly, most companies are still relying on outdated, only partially effective methods to protect their sensitive data, mainly with technology that focuses on preventing… Read More

  • New Box Security Features Give Companies Far Greater Control Over Documents

    New Box Security Features Give Companies Far Greater Control Over Documents

    Box made its name being a user-focused company. Ease of use took priority over everything else, and while they’ve achieved a huge user base in this fashion, a big criticism of the company has been on the security side. It was never secure enough for some IT pros. A series of announcements today at the BoxWorks customer conference should go a long way towards alleviating those concerns. Read More

  • A Letter To Jennifer Lawrence

    A Letter To Jennifer Lawrence

    You and I don’t know each other, but I work in tech news and, as such, have read a lot of technical speculation and analysis of what happened to you and a group of other women who work in Hollywood over the long weekend. While it is not exactly clear how your privacy was violated and your property was stolen, there is apparently an underground ring of people who spend their precious… Read More

  • Twitter Taps HackerOne To Launch Its Bug Bounty Program

    Twitter Taps HackerOne To Launch Its Bug Bounty Program

    Following security breaches that have shook confidence in many online services, Twitter today announced the launch of its bug bounty program that will pay security researchers for responsibly reporting threats through HackerOne, a bug bounty program provider. Twitter will pay a minimum of $140 per threat reported on Twitter.com, ads.twitter, mobile Twitter, TweetDeck, apps.twitter, and its iOS… Read More

  • AVG To Buy Family-Focused Mobile Security Company, Location Labs, In Deal Worth Up To $220M

    AVG To Buy Family-Focused Mobile Security Company, Location Labs, In Deal Worth Up To $220M

    Mobile security company Location Labs is being acquired by online security firm AVG in a deal worth up to $220 million. AVG said today it will pay around $140 million initially to buy Location Labs, plus up to an additional $80 million in cash consideration over the next two years, based on certain performance metrics and milestones being met. Read More

  • Apple Should Be More Transparent About Security

    Apple Should Be More Transparent About Security

    It seems that Apple has gotten embroiled in a security scandal of one sort or another every few months. It dodged Heartbleed but was hit by the very embarrassing ‘goto fail’ bug. It was called out for not adequately documenting the uses of diagnostic tools that could have been used to collect data from user devices. Late last year researchers showed off a method for… Read More

  • Apple’s Two Factor Authentication Doesn’t Protect iCloud Backups Or Photo Streams

    Apple’s Two Factor Authentication Doesn’t Protect iCloud Backups Or Photo Streams

    One of the common bits of advice you’ll see people giving you around this celebrity picture hack is to enable two-factor authentication on your accounts — including Apple’s. That’s good advice, but it wouldn’t have protected any of these celebrities and it doesn’t protect the other accounts that are compromised by hackers that are able to obtain an Apple… Read More

  • Home Depot Investigating Potentially Massive Credit Card Breach

    Home Depot Investigating Potentially Massive Credit Card Breach

    Did you just get your credit card replaced after the Great Target Fiasco of 2013? Don’t get too used to that new card. It’s starting to look like it’s that time again. Home Depot has confirmed that it’s investigating some “unusual activity” with regards to its customer data, and the consistently spot-on Brian Krebs is saying that it’s a credit card breach. Read More