Always keep your protection up-to-date!
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
659 articles
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let’s take a closer look at the situation.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we list the low scorers.
The first five victims of Stuxnet were deliberately selected by the attackers and allowed to execute an attack on the uranium enrichment plant in Netenz.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
It’s not always easy to give general advice to Android users because the OS is so very diverse. But we have ten security tips that are relevant for almost any Android version.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
Brian Donohue reflects on Kaspersky Government Cybersecurity Forum discussions about cyber-resiliency. We all know what resilience means. Technically speaking though, what does it take to be resilient on the network level?
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
We’re taking a look at the security features in the new version of Mac OS X – Yosemite. Apple makes a decent effort.
Hotels offer not just free WiFi but occasionally even free use of devices such as iPads these days. While it is really nice, a misconfigured device like this may store just a bit too much personal data, easily retrievable by the next visitor…
Twitter debuts a grand but simple plan to replace passwords where your phone number is your username and an SMS-generated code is your password.
The owners of certain expensive cars can analyze their driving skills in the same way F1 pilots do. However, this information is sensitive and, thus, should be protected.
New research shows that studying and mnemonic devices could help us to better remember our passwords.
One simple Android game can get as much information about the smartphone’s owner as a real spy can.
A massive provider of insurance for bond investments misconfigured one of its servers and accidentally made a variety of sensitive payment information indexable.
IT workers routinely set up limited privileges for all users for security sake. However, the users are extremely suspicious about these sorts of limitations, assuming (sometimes reasonably) that it will affect the workflow. Is there a way to mitigate these contradictions?