Please turn on your JavaScript for this page to function normally.
Top 10 HTML5 threats and attack vectors

Emerging as popular standard to create Rich Internet Applications and competing with technology stacks like Adobe’s Flex/Flash and Microsoft’s Silverlight is …

Tips for securing Internet connected devices

From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely at the top of many consumers’ holiday wish lists this year. Many lucky …

The problem with current malware metrics

When security companies say that there was an X number of infections from a particular type of malware in the past month or year, or that an Y number of variants of a piece of …

ID theft prevention tips

With the rise in online shopping and mobile shopping it’s more important than ever for consumers to take precautions against identity theft this holiday season. …

Information security or IT security?

One would think that these two terms are synonyms – after all, isn’t information security all about computers? Not really. The basic point is this – you …

Ten cyber shopping tips

Safeguarding one’s online identity is even easier this holiday season with the addition of new mobile and iPad applications that allow you to check your balances while …

Does risk outweigh the benefits from the cloud?

Cloud computing provides organizations with an alternative way of obtaining IT services and offers many benefits including increased flexibility as well as cost reduction. …

Why SMBs are attractive to hackers

A Symantec global survey of nearly 2,000 SMBs showed that 50% did not consider themselves an attack target. However, looking at today’s threat landscape, this is clearly …

Secure practices for online shopping

As we prepare for Cyber Monday and a holiday season of increased online shopping, NCSA advises that everyone take a moment to practice safe cyber behaviors. These simple steps …

Tips for secure mobile payments

With the increased use of mobile devices to pay for goods and services, traditional wallets with cash and credit cards could one day be obsolete. A new ISACA white paper …

Change management leads to security breaches

75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …

Why do companies backup infrequently?

Businesses are on average backing up to tape once a month, with one rather alarming statistic from the same survey showing 10 percent were only backing up to tape once per …

Don't miss

Cybersecurity news