Please turn on your JavaScript for this page to function normally.
EFF: Don’t use the new AOL Instant Messenger

The Electronic Frontier Foundation advises AOL Instant Messenger users not to switch to the new version of the software because it “introduces important …

The antivirus industry and the grayware problem

Grayware is a general term used often used for spyware, adware, remote access tools, dialers and other applications that cannot be defined strictly as malware, but do affect …

Good device and online safety behavior

With more devices in everyone’s hands after the holidays, children are sure to take their cues from parents and older siblings. Ultimately children will become frequent …

Securing Android for the enterprise

The numbers speak for themselves – Android’s share of the worldwide smartphone market is 52.5 percent, more than double compared to a year ago, according to recent …

Tips to manage top IT trends

ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology …

SCADA and PLC vulnerabilities in correctional facilities

Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic …

A Bug Hunter’s Diary

For individuals who make a living developing and maintaining software systems, finding bugs in their own code is almost a daily ritual. Working on software developing projects …

Ways to avoid falling victim to scams

With the holiday season upon us, more companies are sending customers information about great deals for last-minute shopping. Unfortunately, among those exciting offers comes …

Mobile application security risks

Security experts have already agreed on the fact that the increased use of personal mobile devices and smartphones for work purposes is one of the biggest threat to the …

EFF helps travelers defend their data privacy

Anytime you travel internationally, you risk a broad, invasive search of your laptop, phone, and other digital devices – including the copying of your data and seizing …

First EU report on maritime cyber security

ENISA published the first EU report ever on cyber security challenges in the Maritime Sector. This principal analysis highlights essential key insights, as well as existing …

How to avoid malware hiding behind QR codes

As the use of QR codes becomes increasingly widespread, users should be aware that they are also becoming an easy way for malware peddlers to spread their malicious wares. …

Don't miss

Cybersecurity news