Please turn on your JavaScript for this page to function normally.
How to recognize rogue online pharmacies

As the prices of pharmaceuticals keep rising, so does the popularity of online pharmacies. Crooks noticed the high earning potential of rogue online pharmacies from the very …

Best practices for mobile software developers

The PCI Security Standards Council (PCI SSC), a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (PCI DSS), …

Service desks not equipped to deal with BYOD

A majority of company IT support teams are either unable or unwilling to support their employees who want to bring their own device (BYOD) to work, according to a survey by …

The top Internet dangers for kids

As the Internet plays an increasingly prominent role in children’s lives, parents are getting increasingly worried about the ease with which undesirable content can be …

Preparing for your first security breach

So you’ve finally accepted it’s just a matter of time before you experience your first major breach. Despite all the work you’ve put in to your monitoring …

BYOD is not for every company, or every employee

The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …

The Tangled Web: A Guide to Securing Modern Web Applications

We all use the Internet to some extent and browsers to surf through it. With security vulnerabilities affecting them and the technologies that allow them to function popping …

BYOD 2.0 and spotting the next big trend

In the 1960s and 70s the IT department was seen as a secret place ruled by powerful niche experts. They had total control of the department and who could access systems. The …

Automated hacking

The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …

Provisioning is not access governance

Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …

Tips to keep kids safe online

Malware is just a step-away when children click on games, free shoes, Justin Bieber videos or gift cards offered on social networks. Hackers use social engineering techniques …

Website analyzes and rates convoluted Terms of Service

When signing up for an online service, users are required to read and agree to the presented Terms of Service (ToS). But these terms often go on and on, and are written in …

Don't miss

Cybersecurity news