Please turn on your JavaScript for this page to function normally.
Lessons learned developing Lynis, an open source security auditing tool

If you’ve been involved with information security for more than a decade, you’ve probably heard of Rootkit Hunter or rkhunter, a software whose primary goal is to …

Infographic: How to spot a phish

Since many cyber attacks originate with a phishing email, the best way for organizations and individuals to protect themselves online is to identify and avoid phishing emails. …

Infographic: 4 authentication definitions you should know

This infographic by Wave Systems addresses current authentication problems and illustrates how to ensure that only known users access corporate resources, devices and …

Identifying deceptive behavior in user-generated content

In this interview, JT Buser, Manager of Authenticity and Fraud at Bazaarvoice, talks about challenges involved in identifying deceptive behavior in user-generated content as …

Seven Destiny video game tactics that translate to cyber security

Why learn by grinding through dry security best practices when you can make education unique by mixing in a little geeky fun? In the third installment of my security pop …

Android browser SOP bypass bug: Who’s affected, and what to do?

A security researcher has recently discovered not just one but two vulnerabilities in the Android Open Source Project (AOSP) browser that could allow attackers to bypass the …

How can parents keep their children safe on the Internet?

In today’s society, children are unquestionably more tech-savvy than ever before, with far greater access to gadgets and a veritable wealth of information at their …

Modes of defense against security breaches in healthcare

It’s no secret that data security has serious implications for healthcare providers. A major breach can seriously undermine public trust – and result in hefty …

Password security is not just a user problem

When high profile password compromises occur, we often spend a lot of time focusing on advice to the users – “Use strong passwords;” “Don’t reuse …

Education is the key to increasing mobile security

The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …

Data Protection For Photographers
Data Protection for Photographers

Today's high resolution digital cameras ensure that active photographers have to manage massive amounts of data. Keeping this data safe in the long run can present a …

We can fix security, but it’s not going to be easy

When I think about computer security, I like to go back to its early days and compare the situation then with the situation now. Taking a step back is very useful because, …

Don't miss

Cybersecurity news