Conference season 2013 is on. While events like these can be great for networking and mindsharing, there can be computer security dangers lurking about. We've pulled together 8 IT security tips to help you stay ahead of the game.
EADS, maker of the Eurofighter, says that Chinese hackers attacked its computer network last year.
Is your company prepared reducing the likelihood of a successful targeted attack?
Account takeovers are down a mammoth 99.7% compared with what they were at the height of the spear-phishing plague of 2011, the company (rightfully) brags.
Do not relax: such success doesn't let us users off the hook when it comes to account security beef-up.
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.
A targeted Mac malware attack strikes a minority group in China, exploiting an old Microsoft Word vulnerability.
Jawbone, makers of Bluetooth headsets, fitness bracelets, and neat Jambox portable speakers, has warned that hackers managed to break into its systems, and accessed the names, email addresses and encrypted passwords of users.
An internal Federal Reserve site was hacked on Sunday. The personal details on 4,000 US bankers were exposed.
Everything you need to know about the Twitter hack, and how you should respond to it - in simple English.
Are you a "safe surfer"?
What about sites that were perfectly good yesterday, but today are serving phishing pages for the crooks?
Paul Ducklin takes you on a four-country phishing trip...
"There’s no disguising that this is a business that should have known better," says ICO director.
How many headlines do there have to be before companies take data security more seriously?
Within two days of finding and reporting a hole in the college's student portal that would have given out personal info of more than 250K students, the student's subsequent scans incurred the college's wrath.
Were they right to expel him?
A woman called a "terrific employee" by her boss was fired after downloading 6,000 medical records onto a USB drive that she then lost. Whose fault is it, really? Perhaps if the company had technology in place to prevent the transmission of unencrypted records onto a USB device, the lamentable event wouldn't have happened in the first place.
Even if you run a tiny website and don't have much to hide, you (and your customers) are nevertheless at risk from criminals.
For example, @JokerCracker, who openly gives his reason for hacking as, "It's just a personal challenge".
A bug in OKCupid's recently released Crazy Blind Date application allowed complete strangers to paw at users' data.
Medical diagnoses for cancer patients, names and Social Security numbers all went into the trash, unredacted and unshredded, probably in a very misguided effort to save a few bucks on proper record destruction.
Human Resources and Skills Development Canada has admitted that the personal information of more than 500,000 student borrowers has gone missing, lost on an unencrypted removable hard disk.
Ouch! Haven't we learned to encrypt our customers' data yet?
Competent healthcare providers are great at medical things.
Securing electronic devices or health records? Not so much, the Ponemon Institute finds.
An Internet Explorer vulnerability allows hackers to track mouse cursor movement anywhere on the screen, even if a given window is inactive, unfocused or minimised. It can also compromise the security of virtual keyboards and keypads, thereby thwarting their use against keyloggers.