
Protect Your Twitter Account
Twitter is an essential part of anyone’s brand these days, whether you’re a small company, a media mogul or someone who simply likes to share her views with anyone willing
1141 articles
Twitter is an essential part of anyone’s brand these days, whether you’re a small company, a media mogul or someone who simply likes to share her views with anyone willing
Most people are aware that there is a seemingly infinite sea of hackers out there whose goal in life is to steal sensitive data from corporate networks. And while tomes
When a browser asks you if you want it to store, save, or remember your password and you allow it to do so, it actually does store your password in
The first thing you want to be aware of when discussing security features on Google’s Chrome browser is that many of the best options aren’t built into the browser, but
Computers have advanced in the last 20 years from building-sized mainframes to smartphones that can fit in your pocket (and have become infinitely more capable, to boot), yet we use
Everyone knows you should have antivirus applications running on your work and personal computers, but far fewer people take seriously the threat of malware attacks to their mobile devices –
Windows Phone doesn’t have the market reach of Android-powered devices, or the slick appeal of the Apple iPhone, but the availability of multiple Windows 8 devices late this year could
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there
Botnets are large networks of computers that spread malware across the Internet. In order to do that, botnets need to acquire large volumes of IP addresses for their malicious machines.
Google’s Android operating system far and away dominates the mobile market with more than 68 percent of devices running the open source OS, according to research firm IDC. Whilst this
Jailbreaking your mobile device – that is, freeing it from its locked-down status in order to run unauthorized software – used to be for hardcore techies. Not anymore. These days
Hackers spent much of 2012 laying the groundwork for what they have in store for not only big business and strategic government and military targets, but consumers as well in
In a study of just how much people value their privacy, Carnegie Mellon University professor Alessandro Acquisti and other researchers went to a mall outside of Pittsburgh, Pa. They had
It’s a common belief that Macs are safer than PCs because most computer viruses are designed to attack Windows machines and not Macs. Recent high-profile Mac-targeted viruses like MacDefender and
Scareware is the catch-all name used for any of the numerous programs that weasel their way into computers and then pepper users with frightening pop-ups telling them their systems have
When it comes to computers, usability and security aren’t always mutually inclusive concepts. Most times, the easier a system is to use the less protected it is. The tools used
It used to be that Mac users could rest easy, knowing that the vast majority of computer viruses were written to target Windows users, which makes sense given that the
The world of Web apps has grown at a breakneck pace in recent years. That’s been good news for consumers and it’s been utterly fantastic news for attackers, who have
If you own an Android device, your phone could soon be used against you. Research released in late September introduced a new tool that targets Android devices by taking control
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
In terms of security it’s not the one who has more talented programmers who creates the best protection. Instead, it’s often the one who’s been attacked the most who’s forced