February 2014 – Security & Privacy Protection

BITCOIN

Will malware and wallet theft slow-down the Bitcoin drive?

Bitcoins are around now for five years, just recently having gained mass media attention –  not for the right reasons –- but for criminal activities and theft. If the launch of the world’s first Bitcoin ATM has been astonishing a few months back, attacks from unknown hackers started to spread fear and trepidation now.

Will malware and wallet theft slow-down the Bitcoin drive? Read More »

Cyber-security-keyboard

Valentine’s Day advice: Don’t share intimate content via unsecured digital devices

Timely to Valentine’s Day, McAfee released the findings from its 2014 Love, Relationships & Technology survey. For the first time in Singapore, and the second time globally, the company examined how adults are sharing and storing intimate data on their mobile devices, especially with current or former significant others.

Valentine’s Day advice: Don’t share intimate content via unsecured digital devices Read More »

wifisecurity

Primer on WiFi hotspot security

By now everybody is aware of the dangers out there when using WiFi hotspots, isn’t it? Well, according to recent reports surprisingly that isn’t so: Juniper Research, for instance, revealed that only 5% of global smartphones and tablets had security software installed, even though those devices account for 57% of hotspot connections, according to the

Primer on WiFi hotspot security Read More »

data-encryption_300

Sophos delivers encryption without compromise

Sophos just announced its new approach to data protection with the latest release of SafeGuard Encryption. Enabling wide-scale adoption, Sophos is addressing the two biggest issues in encryption, performance and usability, by leveraging native operating system (OS) encryption for better performance, and delivering multi-platform management across all devices and Cloud environments.

Sophos delivers encryption without compromise Read More »

1

Customers are skeptical when it comes to the data collection of their purchasing behavior

The Boston Consulting Group (BCG) has been conducting a global research to study which data customer regard as sensitive and which industries enjoy the utmost confidence in privacy protection. The conclusion has been that data protection needs of customers are pretty similar worldwide: Feedback or complaints about brands, products or services are rated as least

Customers are skeptical when it comes to the data collection of their purchasing behavior Read More »

5

Be alert: Cybercriminals test effectiveness of unsuspicious email attachments

Spam messages with malicious attachments are popular among cybercriminals intending to infect the systems of victims with all kind of malicious software. However, users have become more cautious and more often recognize the evil plan and delete the malicious email attachments immediately – usually .RAR or .ZIP files. Therefore, online gangsters recently started to launch

Be alert: Cybercriminals test effectiveness of unsuspicious email attachments Read More »