Please turn on your JavaScript for this page to function normally.
Identity theft doesn’t take vacations

Identity theft is a real risk and one that is amplified during the summer months. Recent survey results indicated that, whether booking flights at home, logging on at a Wi-Fi …

Protect your computer and phone from illegal police searches

Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search …

Privacy and data breach solutions for healthcare

Today, data breach in healthcare is a surreptitious threat, with a data breach in healthcare occurring every two days. Complicated by federal and state governments regulating …

Internet myths putting Americans at risk

Americans’ knowledge of Internet security is scattered with misconceptions and fallacies that expose PC users to a slew of online threats, according to G Data Security. …

Travelodge UK confirms customer database breach

Budget hotel chain Travelodge UK sent its customers an email confirming that their customer database has been accessed by unauthorized individuals and that the collected email …

Fake federal tax payment emails lead to malware

“Your federal tax payment was rejected”. We imagine that the sight of these words would make even the most security-aware individuals click on anything in sight as …

Dropbox security glitch allowed anyone to access user accounts

Web-based file hosting service Dropbox has confirmed that a bug introduced by a code push allowed anyone to access any user account by simply typing in a random password for a …

Sega hacked, 1.3 million accounts compromised

Sega Corporation was attacked and its database breached last week, and the fact was confirmed by the company the day after it took its SEGA Pass system offline on Thursday. …

Citigroup data theft the result of a common vulnerability

If the information the NYT has received about the Citigroup breach is correct, and the intrusion was made possible by the exploitation of a vulnerability so frequent and …

10 most common iPhone passcodes

The problem of poor passwords is not confined to computer use, and the fact was discovered by an app developer who has added code to capture user passcodes to one of its …

Two-factor authentication for Mailchimp using AlterEgo

MailChimp is an innovative company that provides mailing list management services with a twist. Their down-to-earth approach and focus towards the best user experience is what …

Encrypted voice calling for Android

Cellcrypt launched Mobile for Android, a version of its encrypted voice calling application that runs on Android devices operating over Wi-Fi, GSM and CDMA wireless networks. …

Don't miss

Cybersecurity news