All posts

3313 articles

Infosec 2013: A Review

As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released

Mobile Browser Security

We’re increasingly conducting our online lives through our mobile devices, be they smartphones or tablets, and while that’s a good thing for convenience, it comes with a price. Mobile platforms

botnet

What is a Botnet?

Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely — think “virtual robot army.” The individual PCs that are part of a

PURE 3.0

Safe Online Banking With PURE 3.0

Organized cybercriminals have become adept at accessing consumers’ online bank accounts, exploiting either vulnerabilities in the Web-based application you access from your home computer or mobile device, or weak and

dow jones

Reconsidering Twitter After AP Hack

The Dow Jones Industrial Average fell precipitously Tuesday after a group of pro-Syrian hackers took control of an Associated Press Twitter account and tweeted that U.S. President Barack Obama had been injured

Adobe PDFs and Security

Adobe’s suite of software offerings is one of the most popular programs in the world — which is precisely why it is also one of the most targeted and exploited

Alternative Browsers

At this point, Internet Explorer, Google Chrome, Safari, and Mozilla Firefox are all modern, functional, and perfectly serviceable Web browsers. They each offer a robust set of interesting features, extensions,

tor

What Is Tor?

The privacy and censorship conscious among us are certainly familiar with Tor. Short for “The Onion Router,” Tor is a free tool that keeps a user’s Web browsing private and

The Risks of ‘Checking In’

Sure, it sounds like a great idea to check into your favorite bar or coffee shop on Facebook, Foursquare, Yelp, or any number of applications that let you make similar