Tumblr Security Breach!
The popular microblogging website, Tumblr, announced a breach in its security for iOS customers last week. The company asked all users of its iPhone and iPad app to change their
1194 articles
The popular microblogging website, Tumblr, announced a breach in its security for iOS customers last week. The company asked all users of its iPhone and iPad app to change their
For a very long time, Apple and its pseudo-religious user-base prided itself on being a platform free of malware; those days are inarguably and unequivocally over. Its emergence as the
Google provides some pretty strong security controls like two-factor authentication in order to prevent hackers from hijacking your account and other controls that allow you to recover your account in
Whether or not it is possible to hack a car depends almost entirely on the kind of car you drive. I, for example, drive a 1998 Honda Accord, and I’m
Summer is a great time for vacation for everyone but criminals, for whom it’s among the busiest times of year. That’s because travelers make for easy marks, and their high
It used to be that high school kids spread the news about a party at the house of someone whose parents were out of town by word of mouth. Cell
Unfortunately, it seems like everyone has a cybersecurity scare story that they can tell. Dave Johnson, editor of eHow’s Tech channel wanted to see what kind of stories were out
It’s summer, that time of year where we go on vacation, take lots of pictures — and, of course, upload them to Facebook, Instagram and Twitter. And because we want
It seems like summer just started, but another school year is right around the corner. Don’t let this next semester be overrun with technology issues – check out this Back-to-School
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
There is a common belief that Apple operating systems are well protected against cybercriminals. This belief used to be true, but Apple users are quickly becoming an attractive target for
According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs
Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there’d be some serious value in a
There is an entire market of plugins out there designed to keep you safe while surfing the web on your browser of choice. Each one has lots of options; for
A newly discovered vulnerability in a popular browser exposes how photos can be taken of unsuspecting users. Further proof of hackers’ inventiveness appeared last week in the form of a
In late 2011, it emerged that Chinese hackers had thoroughly compromised the United States Chamber of Commerce, perforating the lobbying-group’s networks with a devastating chain of backdoors. Chamber officials admitted
It’s harder and harder to keep your personal information private when browsing the web, but fortunately there is an entire market of add-on utilities, known as plugins, designed to keep
Father’s Day is fast approaching, which means finding the perfect gift for dad should be at the top of your to do list. And if you’ve had your eye on
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as