Please turn on your JavaScript for this page to function normally.
Tips to keep kids safe online

Malware is just a step-away when children click on games, free shoes, Justin Bieber videos or gift cards offered on social networks. Hackers use social engineering techniques …

Cyber-Ark enhances security of files in-transit

Cyber-Ark Software announced version 7 of its Sensitive Information Management Suite to support secure file exchange environments. The suite isolates sensitive data sent over …

Website analyzes and rates convoluted Terms of Service

When signing up for an online service, users are required to read and agree to the presented Terms of Service (ToS). But these terms often go on and on, and are written in …

Raising user awareness about privacy issues

In this age of social networks, discovering personal information about users has become increasingly easy to do, and that information can be misused at a later date for …

Facebook deceived developers and users with Verified Apps program

The privacy settlement that the US Federal Trade Commission and Facebook agreed on last November has been finalized on Friday and, unlike Google earlier that week, Facebook …

Microsoft and NYPD unveil new centralized surveillance system

New York City and Microsoft have joined forces and developed a new computer system that aggregates and analyzes the information gathered through a number of public safety data …

More than half of employees fail to protect their data

A ComRes poll revealed that while 71% of employees have been able to see or read what someone is working on over their shoulder, 53% do not always take precautions to protect …

Microsoft confirms IE10 will have “Do Not Track” on by default

When Microsoft released the preview of Internet Explorer 10 at the beginning of June and announced that in Windows 8 the browser will be sending a “Do Not Track” …

The fuel that drives global cybercrime

Karine de Ponteves is a FortiGuard AV analyst with Fortinet. In this interview she discusses how cybercriminals exploit major events to deliver malware, the oversharing of …

Apple, Amazon change their security policies following epic hack

In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …

Gizmodo hack reveals worrying flaws in data management policies

Mat Honan, the former Gizmodo employee who’s personal Twitter account compromise resulted in the temporary hijacking of the tech blog’s Twitter account, has …

Burning enterprise authentication issues

Threats keep evolving and are becoming more invasive, targets now go beyond the financial industry and involve any company that has sensitive information – whether its …

Don't miss

Cybersecurity news