Please turn on your JavaScript for this page to function normally.
The SCADA security challenge

One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform. SCADA stands for …

Identity theft on the rise this tax season

The threat of identity theft this tax season leaves consumers with more to worry about than whether or not a tax return is in the mail. A thief may use sensitive information, …

Wide Open Privacy: Strategies For The Digital Life

We live in a digital age where it's become normal to see people post photos of their credit cards online, parents share on Facebook images of their newborns right from the …

Tips to minimize the risk and impact of identity fraud

Last week, a Javelin Strategy & Research report found 12.6 million victims of identity fraud in the United States in the past year, which equates to 1 victim every 3 …

Tips to overcome PHI security obstacles

Healthcare organizations’ privacy programs are still understaffed and underfunded, even while millions of patients’ protected health information (PHI) are …

SmishGuru simulated attack service launches

Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing …

Security pros should listen with their heads, not their hearts

There is a phrase that has become quite popular in information security circles and it goes along the lines of “there are two types of organizations, those that have …

How to successfully submit conference talks

There are many ways a security professional can increase his public profile, and one of these is speaking at a conference. However, getting your work accepted at an event is …

Unintended, malicious and evil applications of augmented reality

Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …

Social engineering: Clear and present danger

Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …

Cybersecurity concerns of online dating

ThreatMetrix announced several ways for consumers to stay protected from online dating fraud and malware as Valentine’s Day approaches. According to Fast Company, online …

Identity theft protection tips

More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which …

Don't miss

Cybersecurity news