Please turn on your JavaScript for this page to function normally.
A new perspective on the insider threat

When talking about the insider threat, the first that comes to mind to many (if not all) information security professionals is the threat posed by rogue insiders that …

The multiple dimensions of corporate espionage

You’ve spent months fixing the red items on an internal audit report and just passed a regulatory exam. You’ve performed a network vulnerability assessment and …

Holiday travel is risky business for mobile devices

The holidays are a time for tropical getaways, traveling to Grandma’s house to see family and friends and one of the likeliest times a person will lose their mobile …

Tips to stay protected online

Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus software is a key step in defending against …

Top 10 HTML5 threats and attack vectors

Emerging as popular standard to create Rich Internet Applications and competing with technology stacks like Adobe’s Flex/Flash and Microsoft’s Silverlight is …

Tips for securing Internet connected devices

From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely at the top of many consumers’ holiday wish lists this year. Many lucky …

The problem with current malware metrics

When security companies say that there was an X number of infections from a particular type of malware in the past month or year, or that an Y number of variants of a piece of …

ID theft prevention tips

With the rise in online shopping and mobile shopping it’s more important than ever for consumers to take precautions against identity theft this holiday season. …

Information security or IT security?

One would think that these two terms are synonyms – after all, isn’t information security all about computers? Not really. The basic point is this – you …

Ten cyber shopping tips

Safeguarding one’s online identity is even easier this holiday season with the addition of new mobile and iPad applications that allow you to check your balances while …

Does risk outweigh the benefits from the cloud?

Cloud computing provides organizations with an alternative way of obtaining IT services and offers many benefits including increased flexibility as well as cost reduction. …

Why SMBs are attractive to hackers

A Symantec global survey of nearly 2,000 SMBs showed that 50% did not consider themselves an attack target. However, looking at today’s threat landscape, this is clearly …

Don't miss

Cybersecurity news