Want to Beat Social Engineering? Training Is Key
Of all the misunderstandings out there about hacking and network security, one of the biggest may be that network intrusion and data theft are …
9 Resources to Stay Current on Security Threats
In the world of IT security, threats are constantly evolving and shifting. It’s critical to stay abreast of the current (and hopefully future) threat …
6 Criteria for Evaluating Secure File Transfer Apps
File transfer protocol (FTP) was developed in the early 1970s when security concerns and usability were less important than getting data from one place …
US Government Is Paying To Undermine Internet Security, Not To Fix It
The Heartbleed computer security bug is many things: a catastrophic tech failure, an open invitation to criminal hackers and yet another reason to upgrade …
The Gyroscopes in Your Phone Could Let Apps Eavesdrop on Conversations
In the age of surveillance paranoia, most smartphone users know better than to give a random app or website permission to use their device’s …
Recent Comments