Ten tips for mobile security
Mobile devices have become increasingly common and the markets are flooded with new applications for business and entertainment. People are using mobile devices to play games, …
Guidance on cybersecurity, private clouds and privacy
ISACA today issued guidance on managing three top trends posing major challenges to businesses in 2013: cybersecurity threats, private vs. public clouds and data privacy. …
Online reputation management tips
AVG announces twelve tips for individuals to safeguard their reputations while engaging in heightened e-commerce and social media activities during the holidays. …
Privacy protection tips
Every month more than 5,000 people take to Twitter to complain about how their mobile device has been snooped on or their visual privacy invaded. Who can’t resist …
Staying safe if your IT security budget gets cut
As companies continue to struggle in today’s difficult economy, cutbacks affect all sectors of organizations. Unfortunately, IT security solutions are often not spared …
Three major impacts when moving to a BYOD policy
Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …
Essential safe shopping tips
Based on Kaspersky Lab’s world-wide insight into malicious software and online scammers, the company offers the following 10 warnings and tips for online shoppers: …
Cyber Monday safety tips
AVG Technologies announces five tips to help consumers ensure secure online shopping. Whether from desktops, laptops, tablets or smartphones, these tips help consumers make …
Tips for a safe online shopping season
The holiday season presents the perfect opportunity for cybercriminals to steal consumers’ information as shopping is increasingly conducted online. According to a 2011 …
Free ebook identifies easy to manage network security vulnerabilities
nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …
Video: Why privacy matters
Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …
PCI Council adds guidelines for data security risk assessment
The PCI Security Standards Council (PCI SSC) released the PCI DSS Risk Assessment Guidelines Information Supplement, a product of the PCI Risk Assessment Special Interest …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring