Please turn on your JavaScript for this page to function normally.
Web-based breach tool for healthcare IT

Healthcare has become one of the most-breached industries, placing hospitals, clinics and health plans under scrutiny of the Department of Health and Human Services (HHS) …

Mozilla wants CAs to stop issuing and revoke MITM certificates

A heated debate has unfolded after Trustwave made public their decision to revoke a subordinate root certificate it issued to a company that allowed it to intercept their …

Best practices for online banking security

There are two common misconceptions about online banking security which are holding financial institutions back from offering their customers the best services possible. …

Tax payers unaware of identity theft risks

While consumers remain concerned about identity theft, there are some common misconceptions about the risk of preparing and submitting their tax documents, and many are …

Privacy pitfalls of online dating

It used to be that you were pretty much anonymous on the Internet if you chose to be, but those halcyon days are now gone, and you should think about whether it’s safe …

Free online privacy tool

Abine released Do Not Track Plus (DNT+), a tool that makes it easy for anyone to see when they’re being tracked online and stop being profiled by social networks, large …

How online communication connects generations

AARP and Microsoft released “Connecting Generations,” a research report that examines how people of all ages are using online communication and social networking …

Attackers use fake friends to blend into Facebook

A new Barracuda Labs study provides an example of an increasing number of attackers move to social networks to carry out their wares. The study analyzes a random sampling of …

Concerned about online privacy? FBI says you might be a terrorist

Being concerned about your online privacy might be a sign that you’re up to no good, says the FBI and the US Department of Justice, via a collection of 25 fliers to be …

Privacy and Big Data

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what …

Identity and access management trends

Six major trends will drive the evolution of corporate management of identity and access management (IAM) and privacy management in 2012, according to Gartner. “In 2012, …

Protect sensitive data on Mac OS X, Windows and Linux

CoSoSys released EasyLock 2, their portable data protection solution. The enhanced new version offers full support for cross platform encryption between Windows, Mac OS X and …

Don't miss

Cybersecurity news