Learn by doing: Phishing and other online tests
As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …
The privacy cliff and how not to fall off it
We are all hearing the phrase “fiscal cliff” considerably more times than is useful. So far, however, nobody’s mentioned a “privacy cliff.” They …
The privacy implications of Facebook Graph Search
With a billion people sharing an assortment of personal information on a daily basis, Facebook holds the most significant amount of private information in today’s …
Scareware trends and expected developments
While malware such as viruses, worms and Trojans strives to remain hidden from view for as long as possible, scareware (rogueware and ransomware) aims to be as noticeable and …
How do you protect your phone and your data?
Given the risks we run in not securing our phones, you’d be forgiven for thinking it must be a task requiring a doctorate in computer science. In reality, however, …
Practical steps to minimize data privacy threats
Google comes across 9,500 new malicious websites each day and responds by sending notifications to webmasters. Nevertheless, these websites are just one of the many dangers …
Privacy tips for social networking, apps and geolocation
Many people confuse data privacy and data security. While there are similarities, privacy and security are not the same thing. Data security focuses on the confidentiality, …
How taxpayers can protect themselves against identity theft
ThreatMetrix has identified the top precautions taxpayers should take when e-filing to protect their returns against cybercriminals. According to Forbes, more than 80 percent …
How to avoid Facebook scams and limit the damage they make
Last week I wrote about the most common Facebook scams, the reasons why they are perpetually so successful, and what the scammers who set them up are after. Today I will …
Top five hurdles to security and compliance in industrial control systems
For many decades, Industrial Control Systems (ICS) have been the operational systems relied upon to safely and reliably deliver the essentials of daily life. Sometimes …
Video: Practical exploitation of embedded systems
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems. It covers hardware by showing how to …
How to spot APT attacks
With the proliferation of Advanced Persistent Threats (APTs), it’s paramount for those who are charged with defending the systems and networks of likely targets to know …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics