Threats of the Digital World Q1 2013
We want you to be fully aware of the latest changes in the threat landscape. Our friends at securelist have compiled a quarterly report of digital threats and we’ve included
2890 articles
We want you to be fully aware of the latest changes in the threat landscape. Our friends at securelist have compiled a quarterly report of digital threats and we’ve included
Parental controls are all the rage these days, as moms and dads everywhere fight the good fight to keep their kids safe, ensure they are exposed only to appropriate content
Olga Rumyantseva began her 7 Volcanoes expedition in Antarctica as the first Russian woman to climb Mount Sidley. Mount Sidley (4,285 m) is the highest and most imposing of the five volcanic
Microsoft (and Adobe for that matter) released a slew of security updates in the May 2013 edition of their monthly patch Tuesday release. As always, if your machine isn’t set
Getting to the bottom of independent AV comparative testing – who to believe and how to make the right decision. We respect the right of any user to choose a
When the U.S. Government comes poking around the world’s major Internet companies asking for customer data, Verizon, AT&T, Apple, and Yahoo are not particularly interested in protecting the general public,
There are occasions when you’ll want to delete your data more securely and permanently than simply moving files to the Trash folder and emptying the Trash. Typical deletion methods allow
Permanent deletion by default after a predetermined amount of time is the gimmick that drove Snapchat users to upload more than 150 million photos a day in April. Problematically, Snapchat’s
E-readers are all the rage these days. Why carry ten pounds of books on vacation, or bother with folding and rolling a magazine on the subway — and let’s not
Kaspersky Lab has signed an agreement with Qualcomm Technologies to protect smartphones and tablets.
Over the last 9 years Facebook has grown from a small social networking site originally intended for college students into a worldwide platform that is now used not only by
Mother’s Day is a few days away and if you are a last minute shopper, you may be taking to the Internet to try and find that special gift for
Given the deftness of malicious hackers, the bar-lowering impact of easily accessible markets for automated cybercriminal kits, and the increasing number of online services and people connected to the Internet,
If we really wanted to thoroughly discuss ‘HTTPS’ and Digital Certificates, then we’d need to talk about cryptography, but don’t worry, because we’re going to go ahead and spare you
Modern smartphones consume so much energy that charging them once a day is not always enough. When they are used intensively, the user sometimes has to look for a power
Virtual Private Networks, or VPNs for short, have become increasingly essential of late as we more often access sensitive data from remote locations — and as the threat of having our
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
“Snapchat is a new way to share moments with friends,” reads the opening sentence of the temporary photo-sharing application’s “about us” page. The description is just vague enough to technically
LivingSocial informed its millions of customers over the weekend that malicious hackers had compromised the popular coupon site’s computer systems, exposing the names, email addresses, dates of birth, and encrypted
As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released
People rely on the Internet today for so much more than they did even five years ago. Whether it’s social media, mobile applications, online banking, shopping, or just renewing your