This tax season you may have more to worry about than how much you owe. A new study from Identity Finder finds the IRS is not properly protecting social security numbers in some tax returns.
Personal tax returns are not public, but the tax returns of non-profit organizations are public domain. Identify Finder used the OCR (optical character recognition) module of its Sensitive Data Manager software to analyze nearly four million publicly available tax return image or PDF files ranging from 2001 to 2012.
This is a preview of
Study: IRS exposing Social Security numbers online
.
Read the full post (127 words, estimated 30 secs reading time) Categories: General.
Tags: Exposing, Numbers, Online, Security, Social, Study
By IPHere —
February 25, 2014 at 12:14 am Many lower-cost networking products claim to do the same thing as high-end gear without the high price tag. Here’s how to get more information before you dive into a misguided pilot project or prematurely dismiss an acceptable alternative.
Network Computing
Permanent link to this post (41 words, estimated 10 secs reading time)
Categories: General.
Tags: Behind, Best, Evaluating, networking, Pitch, Practices, Products, Sales
By IPHere —
February 24, 2014 at 6:12 pm Understanding your options for moving backup, disaster recovery or business continuity processes to the cloud can be confusing. Here’s a primer.
Network Computing
Permanent link to this post (24 words, estimated 6 secs reading time)
Categories: General.
Tags: Basics, Cloud, data, Protection
By IPHere —
February 24, 2014 at 12:12 pm Mobile devices are prime targets for for cyber criminals, and a report by mobile security company Lookout reveals some surprising data about how they plot their attacks.
Lookout collected data from more than 50 million users between January and December of 2013. It analyzed the information and broke it down by region and type of attack to get a picture of mobile attack trends. The results are weighted to normalize the differences between life cycles of users in different regions.
This is a preview of
Lookout study: hackers target mobile attacks by region
.
Read the full post (94 words, estimated 23 secs reading time) Categories: General.
Tags: Attacks, Hackers, Lookout, Mobile, region, Study, Target
By IPHere —
February 21, 2014 at 6:17 pm Faster speeds are just part of the new Ethernet technology. New forwarding technologies and the emergence of SDN also are changing the Ethernet switch landscape.
Network Computing
Permanent link to this post (28 words, estimated 7 secs reading time)
Categories: General.
Tags: Ethernet, Evolution, Switch
By IPHere —
February 21, 2014 at 12:13 pm Security vendors have been preaching about the impending doom of mobile malware for a few years now. Each year seems to see a dramatic spike in detected malware over the previous year, but users are starting to get a bit cynical about the coming mobile malware apocalypse. A new report from Webroot once again highlights an increase in mobile malware and also sheds light on how iOS compares to Android.
This is a preview of
Study: 6 out of 10 Android apps a security concern
.
Read the full post (132 words, estimated 32 secs reading time) Categories: General.
Tags: Android, Apps, Concern, Security, Study
By IPHere —
February 21, 2014 at 6:13 am Survey shows WANs often are dragging down application performance, but organizations aren’t doing much to improve them.
Network Computing
Permanent link to this post (20 words, estimated 5 secs reading time)
Categories: General.
Tags: Finds, Needs, Performance, Report, Work
By IPHere —
February 20, 2014 at 6:15 pm IPv6 testing programs provide technology validation and give engineers confidence in their IPv6 deployments. Here’s a look at three IPv6 testing programs.
Network Computing
Permanent link to this post (25 words, estimated 6 secs reading time)
Categories: General.
Tags: Approval, Earning, IPv6, Seal
By IPHere —
February 20, 2014 at 12:16 pm Sepaton-sponsored poll indicates that many enterprises still lag on disaster recovery planning and backup environments are strained.
Network Computing
Permanent link to this post (20 words, estimated 5 secs reading time)
Categories: General.
Tags: Challenges, data, Enterprise, Finds, Persist, Protection, Survey
By IPHere —
February 20, 2014 at 6:16 am Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.
In its 2013 Microsoft Vulnerabilities Study, Avecto found that you could mitigate almost every single Critical vulnerability simply by removing administrator rights. The exact number was 92 percent, but that brings the number of serious threats from 147 down to around 12.
This is a preview of
One tweak can make your Windows PC virtually invulnerable
.
Read the full post (101 words, estimated 24 secs reading time) Categories: General.
Tags: invulnerable, tweak, Virtually, Windows
By IPHere —
February 20, 2014 at 12:16 am