Please turn on your JavaScript for this page to function normally.
Social engineering: Clear and present danger

Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …

Cybersecurity concerns of online dating

ThreatMetrix announced several ways for consumers to stay protected from online dating fraud and malware as Valentine’s Day approaches. According to Fast Company, online …

Identity theft protection tips

More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which …

Five safety tips for Valentine’s Day

Whether you decide to give flowers, chocolates or something a little more unusual as the perfect symbol of your affection this Valentine’s Day, make sure you take extra …

PCI DSS cloud computing guidelines

The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …

Learn by doing: Phishing and other online tests

As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …

The privacy cliff and how not to fall off it

We are all hearing the phrase “fiscal cliff” considerably more times than is useful. So far, however, nobody’s mentioned a “privacy cliff.” They …

The privacy implications of Facebook Graph Search

With a billion people sharing an assortment of personal information on a daily basis, Facebook holds the most significant amount of private information in today’s …

Scareware trends and expected developments

While malware such as viruses, worms and Trojans strives to remain hidden from view for as long as possible, scareware (rogueware and ransomware) aims to be as noticeable and …

How do you protect your phone and your data?

Given the risks we run in not securing our phones, you’d be forgiven for thinking it must be a task requiring a doctorate in computer science. In reality, however, …

Practical steps to minimize data privacy threats

Google comes across 9,500 new malicious websites each day and responds by sending notifications to webmasters. Nevertheless, these websites are just one of the many dangers …

Privacy tips for social networking, apps and geolocation

Many people confuse data privacy and data security. While there are similarities, privacy and security are not the same thing. Data security focuses on the confidentiality, …

Don't miss

Cybersecurity news