Brian Prince

Research: Highest Rates of U.S. Identity Fraud Found in New York

Recent research by ID Analytics reveals that New York, California and Nevada have the highest rates of identity theft in the country. The findings were released Feb. 14 by the San Diego-based company, which helps its clients spot the possibility of identity theft and determine the next best steps to verify an identity. The research […]

DHS Brews Up Cyber Storm 2

The U.S. Department of Homeland Security is planning a massive test in March of 2008 to determine how the nation will respond to a major cyber-attack. The test, called Cyber Storm 2, is the second of its kind, following a week-long simulation in 2006 that involved 115 private international and domestic companies and organizations. Last […]

McAfee Study: Malware Attacks Spreading to Mobile Devices

Researchers at McAfee said malware is hitting mobile device users around the world at increasing rates. The study, which was performed by Informa Telecoms and Media and sponsored by McAfee, found 83 percent of mobile operators surveyed have been hit by mobile device infections, and that nearly half of the operators that have experienced mobile […]

OIG Report Criticizes FBI over Missing Laptops, Weapons

The FBI still cant seem to keep track of all its laptop computers. According to a new report by the Office of the Inspector General, two and three laptops each month are lost or stolen from the bureau—and the FBI cannot determine in many cases whether the computers contained classified data. “We recognize that in […]

RSA Exec Sees Future of Security in Information Management

“The security really needs to follow the data.” That axiom came from Dennis Hoffman, an executive in EMCs RSA security division, as he discussed the direction his company will take in 2007 with eWEEK at the RSA Conference Feb. 8. It seems like common sense—data needs to be protected as it travels from place to […]

Next Wave in Security: Protecting Smart Phones, PDAs

SAN FRANCISCO—With the number of employees using smart phones and other mobile devices, corporations must start to focus their security on more than just their network perimeter, according to security analysts and specialists attending the RSA Conference here. Research done by the Business Forum Management Program in 2006 found that roughly 49 percent of the […]

Can ID Theft Be Solved with More Regulation?

SAN FRANCISCO—Early one morning several years ago, the police knocked on Robert Maynards door and told him he was under arrest for fraud. There was just one problem: The Robert Maynard the police were looking for did not actually exist. Maynard was the victim of identity theft. Today, he is co-founder and chief operating officer […]

Companies Should Secure Mobile Workforce, Analysts Say

It could be as simple as a smart phone dropping out of a CEOs pocket. From there, countless pieces of data fall from a pants pocket into the wrong hands. With that in mind, companies need to secure network access and have the proper procedures in place to secure their mobile workforce, industry insiders said […]

Spying on Users: Getting to the Rootkit of the Matter

SAN FRANCISCO—The word “rootkit” often send chills up the spines of IT security professionals. But not all rootkits are launched by cyber-criminals bent on stealing personal information, industry experts said at a panel discussion at the RSA Conference here Feb. 6. Stealthy technology at the kernel level has moved from being the turf of cyber-criminals […]

IBM Shields Online Personal Data

Researchers at IBM have created a new shield for personal information to help prevent identity theft online. Code-named Identity Mixer—or Idemix for short—the software was crafted by IBM researchers at the companys laboratory in Zurich, Switzerland, and will let customers buy goods and services online without revealing their personal information. To Jan Camenisch, the projects […]