False Perceptions of IT Security: Passwords
As you know, it is quite important to have a strong password. But what is a strong password?
614 articles
As you know, it is quite important to have a strong password. But what is a strong password?
Sony Pictures Entertainment fell victim to a massive hack. Attackers used destructive malware to bring SPE networks down, while stealing up to 11 TB of data, which included both trade secrets, yellow press fodder, passwords to social networks accounts, and a lot of private information.
Children are crazy about tablets but it is important to set limitations in order to prevent it from becoming a real obsession. Here are a couple of tips to help you tame your child’s iPad.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we list the low scorers.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
Kaspersky Lab has just announced the discovery of an alarming APT campaign codenamed “Darkhotel,” targeted mainly at business executives staying at certain hotels in Asia. Luxury hotels offer not just places to stay, but also comfort and privacy. However, their cybersecurity occasionally fails.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
Twitter debuts a grand but simple plan to replace passwords where your phone number is your username and an SMS-generated code is your password.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
KL and Mensa have announced the first champion of the Global Think Test challenge.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
Your data is the finest treasure on your computer. Protect it the way the secret service protects a president, create a robust defense system where an antivirus will be just the last line of defense.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Some things we routinely do in the office are dangerous for careers as they pose significant risk to the company’s business. It’s equally relevant for CEO and intern alike, so watch out!
No one likes support helpline queues, and we have some tools to provide you with an answer to your question almost instantly.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.