To Jailbreak or Not Jailbreak Your Device. The Pros and Cons.
Jailbreaking your mobile device – that is, freeing it from its locked-down status in order to run unauthorized software – used to be for hardcore techies. Not anymore. These days
1118 articles
Jailbreaking your mobile device – that is, freeing it from its locked-down status in order to run unauthorized software – used to be for hardcore techies. Not anymore. These days
In a study of just how much people value their privacy, Carnegie Mellon University professor Alessandro Acquisti and other researchers went to a mall outside of Pittsburgh, Pa. They had
One of the little compromises that we’ve all had to make to get the advantages of mobile apps is the blind acceptance of the terms of service for the app
A report out earlier this year indicated that robbing banks in the UK is a risky business, and not very lucrative at that: Bank burglars in Great Britain net an
One of the many problems inherent in social networks such as Twitter, Facebook and LinkedIn is the issue of authentication. People want to connect with their friends and colleagues, but
There is no shortage of hard problems to solve in security. Unsafe Web applications, network defense, mobile device security–all of these are challenges in need of solutions. And the students
A common lament in the security industry is the lack of young talent, of educated and dedicated people coming out of universities with fresh ideas. Executives and engineers often wonder
Depending on how you look at it, the security built into Apple’s latest desktop operating system is either a masterstroke in computer protection or the latest twist in the company’s
Android users who do not upgrade their operating systems when new versions become available jeopardize the security of their devices, according to new research from Web security firm Duo Security.
Computer viruses are scary, but they don’t always sound it – often their names are misleadingly bland or deceptive. The I Love You virus wreaked havoc in banks and security
If you are a parent who has secretly viewed your child’s Facebook profile, you are hardly alone. A new study shows that nearly 60 percent of American parents are right
When it comes to computers, usability and security aren’t always mutually inclusive concepts. Most times, the easier a system is to use the less protected it is. The tools used
The world of Web apps has grown at a breakneck pace in recent years. That’s been good news for consumers and it’s been utterly fantastic news for attackers, who have
Travelers abroad beware: Pop-up windows that require you to download a supposed software update in order to get online may instead be installing a malicious program that could harm your
The pervasiveness of public WiFi has reached a point now that it’s become difficult to avoid. You actually have to go out of your way to NOT use public hotspots,
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
In terms of security it’s not the one who has more talented programmers who creates the best protection. Instead, it’s often the one who’s been attacked the most who’s forced
Look at any one of the dozens of reports about cybercrime levels, and you’ll inevitably come away with the conclusion that online crime is getting worse by the day. And
The phrase targeted attack looks to be redundant at first glance. Of course an attack is targeted. What good would it be without a target? But the reality is that
There’s no two ways about it, cybercrime is big business. Accurate estimates are hard to come by, but you can safely assume it’s well into the billions of dollars. Likely
The next version of Internet Explorer, IE 10, is designed by default to prevent your online activity from being tracked by would-be advertisers. But that may not stop advertisers from