Please turn on your JavaScript for this page to function normally.
Most users unaware of smartphone security risks

Consumers are indifferent to the many serious security risks associated with the storage and transmission of sensitive personal data on iPhone, Blackberry and Android devices, …

Tips to keep information secure when filing taxes online

As the IRS tax filing deadline quickly approaches, Identity Finder released tips to help individuals protect private and personally identifiable information. The IRS reports …

Five security secrets your IT administrators don’t want you to know

As valued members of your organization, IT administrators work every day to keep your infrastructure up and available. But in today’s rush to contain operational costs, …

A closer look at MacKeeper

MacKeeper (v1.0.3.) is a comprehensive bundle of various system utilities that will help you keep your Mac secure from malware; find it if it gets stolen; backup, restore, …

Etsy privacy changes leave a lot to be desired

The Internet was all abuzz yesterday about Etsy’s privacy snafu that made its buyer’s full names and purchase histories available for everyone to see. Anyone who …

Health Net suffers massive data breach

Health Net is conducting an investigation into several server drives that are unaccounted for from its data center operation located in Rancho Cordova, Calif. This …

Etsy privacy blunder makes buyers’ purchases public

Etsy, the popular online market for small scale artisans and crafters, might be on the right track for a future privacy lawsuit following last week’s unveiling of its …

Former NSA and CIA Director advocates cyber threat transparency

The former NSA and CIA Director Gen. Michael Hayden could possibly be the last person you would expect to be advocating government transparency. However, his commentary in the …

Restrictive e-mail policies: Hidden security risks for business

IT departments are fighting a losing battle in seeking to constrain employees’ behavior through policy alone, according to Mimecast. Findings suggest that a new approach …

How can the author of an anonymous e-mail be identified?

When anonymous letters were written by hand, graphologists were called in to identify the likely author. In this day and age when most such mail is sent electronically, it may …

The privacy impact of electronic health records

While patients trust their doctors to protect their information, 49 percent believe that EHRs will have a negative impact on the privacy of their PHI and health data, …

Moldovan fraud ring mastermind arrested

A coordinated effort of the Irish gardai and custom officers has led to the arrest of a Moldovan man that is thought to be the leader of and mastermind behind an international …

Don't miss

Cybersecurity news