The risks of online shopping
More people than ever are using their personally owned smartphones to send and receive e-mails, browse the Internet, shop online and visit social media sites – as well …
The challenges of setting up a security conference
In this podcast recorded at the SecurityByte conference held this year in Bangalore, India, the conference founder Nishchal Bhalla talks about his motivations for organizing …
A new perspective on the insider threat
When talking about the insider threat, the first that comes to mind to many (if not all) information security professionals is the threat posed by rogue insiders that …
The multiple dimensions of corporate espionage
You’ve spent months fixing the red items on an internal audit report and just passed a regulatory exam. You’ve performed a network vulnerability assessment and …
Holiday travel is risky business for mobile devices
The holidays are a time for tropical getaways, traveling to Grandma’s house to see family and friends and one of the likeliest times a person will lose their mobile …
Tips to stay protected online
Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus software is a key step in defending against …
Top 10 HTML5 threats and attack vectors
Emerging as popular standard to create Rich Internet Applications and competing with technology stacks like Adobe’s Flex/Flash and Microsoft’s Silverlight is …
Tips for securing Internet connected devices
From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely at the top of many consumers’ holiday wish lists this year. Many lucky …
The problem with current malware metrics
When security companies say that there was an X number of infections from a particular type of malware in the past month or year, or that an Y number of variants of a piece of …
ID theft prevention tips
With the rise in online shopping and mobile shopping it’s more important than ever for consumers to take precautions against identity theft this holiday season. …
Information security or IT security?
One would think that these two terms are synonyms – after all, isn’t information security all about computers? Not really. The basic point is this – you …
Ten cyber shopping tips
Safeguarding one’s online identity is even easier this holiday season with the addition of new mobile and iPad applications that allow you to check your balances while …
Featured news
Resources
Don't miss
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
- DeepSeek’s popularity exploited by malware peddlers, scammers