Russia Protects Communications by Using Typewriters
If you have been following international news headlines with stories like WikiLeaks spreading confidential documents, and recent revelations about a US surveillance scandal, it kind of feels like we...
View ArticleDon’t Forfeit Your Command-and-Control Center To a Zombie Army
With an increase in Distributed Denial of Service (DDOS) attacks and packet flooding volume, its evident that hackers are using compromised web servers for their malicious activities. By infecting...
View ArticleIt’s Time to Reevaluate How You Share Photos
If you use a smartphone to take personal pictures and post them to the Internet, then you may unknowingly be posting more about yourself than you want to, like where and when the picture was taken....
View ArticleHalf of Organizations Targets of Cyberattack in Last Year
CSO — About half of global organizations have suffered a cyberattack in the last year, said a report released on Tuesday by the Information Security Media Group and Bit9.Almost two-thirds of the...
View ArticleTrojan:Win32/Crilock.A Nasty Ransomware You Need to Guard Against
On September 10th, 2013, a new ransomware known as Trojan:Win32/Crilock.A began attacking computers all over the Internet, locking users out of their PCs and putting sensitive information at risk. If...
View ArticleHow to Protect Your Cloud Hosted Data from Security Breaches
Recently, Adobe sent out e-mails and letters to users notifying everyone of a security breach. "The attackers may have obtained access to your Adobe ID and encrypted password." The obvious question...
View ArticleProtect Your Business with Intelligent Surveillance Cameras
The world you do business in is a pretty dangerous and messed up place, and things always seem to be getting worse. Thankfully, security technology is improving, which helps offset the risks of living...
View Article2 Million Passwords Stolen! Have You been Hacked?
On December 3, 2013, security company Trustwave discovered over two million stolen user passwords for popular online services like Facebook, LinkedIn, Google, Twitter, Yahoo, and 93,000 other websites....
View ArticleWhat do Hackers Want with Your Email?
The value of your email account cannot be understated. You may think less of your email inbox because there are so many other ways to digitally communicate, but to a hacker, your email is a goldmine of...
View ArticleHow the Personal Information of 200 Million Users Wound Up on an Illegal ID...
You're likely familiar with the various ways that hackers can steal your identity, but you may not be familiar with how hackers anonymously buy and sell people's personal information to interested...
View Article
More Pages to Explore .....