Please turn on your JavaScript for this page to function normally.
Security pros should listen with their heads, not their hearts

There is a phrase that has become quite popular in information security circles and it goes along the lines of “there are two types of organizations, those that have …

How to successfully submit conference talks

There are many ways a security professional can increase his public profile, and one of these is speaking at a conference. However, getting your work accepted at an event is …

Unintended, malicious and evil applications of augmented reality

Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …

Social engineering: Clear and present danger

Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …

Cybersecurity concerns of online dating

ThreatMetrix announced several ways for consumers to stay protected from online dating fraud and malware as Valentine’s Day approaches. According to Fast Company, online …

Identity theft protection tips

More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which …

Five safety tips for Valentine’s Day

Whether you decide to give flowers, chocolates or something a little more unusual as the perfect symbol of your affection this Valentine’s Day, make sure you take extra …

PCI DSS cloud computing guidelines

The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …

Learn by doing: Phishing and other online tests

As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …

The privacy cliff and how not to fall off it

We are all hearing the phrase “fiscal cliff” considerably more times than is useful. So far, however, nobody’s mentioned a “privacy cliff.” They …

The privacy implications of Facebook Graph Search

With a billion people sharing an assortment of personal information on a daily basis, Facebook holds the most significant amount of private information in today’s …

Scareware trends and expected developments

While malware such as viruses, worms and Trojans strives to remain hidden from view for as long as possible, scareware (rogueware and ransomware) aims to be as noticeable and …

Don't miss

Cybersecurity news