Please turn on your JavaScript for this page to function normally.
What every CEO should know about advanced persistent threats and industrialized hacking

The world of hacking has evolved into two major varieties: industrialized attacks and advanced persistent threats (APT). There has been a lot of discussion around the validity …

A closer look at My Lockbox PRO

My Lockbox PRO (v. 2.0) enables you to hide, lock and password protect almost any folder on your computer. You can use My Lockbox to hide your private data from prying eyes …

Uncovering the business benefits behind the new ICO powers

The latest amendment to the Data Protection Act, which came into effect on the 6th of April, means that the Information Commissioner’s Office (ICO) is now able to impose …

A preventative, layered approach to head off sophisticated malware threats

It attacked early in the morning without warning, provocation or even a whiff of foreshadowing. Unnoticed, it stealthily wormed through Beefmaster.com’s network …

What’s privacy got to do with it?

The news has been rife over the last few weeks with stories of privacy breaches by names we trust and use on daily basis. First it was Google. The corporation with the most …

Social Engineering and Dr. Cialdini’s “Influence”

Over the past few years, we have completed a number of social engineering tests as part of advanced penetration testing at various organizations. Coincidentally, I recently …

A closer look at PC Tools Firewall Plus

PC Tools Firewall Plus (6.0.0.88) is a free personal firewall for Windows. It helps you prevent unauthorized users from gaining access to your computer through the Internet or …

Q&A: Symantec’s acquisitions and the future

Francis deSouza is senior vice president of the Enterprise Security Group at Symantec. In this interview he discusses Symantec’s recent acquisitions, how they mitigate …

Surviving and recovering from network interruptions

Ongoing changes to network and security device configuration are unavoidable and necessary for business. But they are also risky. They can have unexpected consequences – …

Security process automation: Create order from chaos

As a boy I loved Lego. I’d use the red and green and white bricks that in those days came in just a few shapes, to construct houses, ships, cars and stairways that lead …

Check the privacy level of your Facebook account

If you have been worried lately about what information that you have included in your Facebook account might be accessible to people other than your Facebook friends, wonder …

Q&A: Anti-phishing training game

Norman Sadeh, CEO or Wombat Security, is also a Professor in the School of Computer Science at Carnegie Mellon University where he developed Wombat’s anti-phishing …

Don't miss

Cybersecurity news