Tony BradleyPCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.

cybersecurity

Selling passwords for $150, and other dumb ways users threaten corporate security

Ironically, the same employees surveyed who were often lax on corporate security were nevertheless vigilant about their own digital security.

obama

Obama supports cybersecurity and privacy, but experts warn of unintended impacts

Calls for better information sharing and data breach reporting, and better cybercrime-fighting tools, could hamper innovation or infringe on privacy, experts caution.

fido alliance u2f usb authentication oct 2014

Data breaches can be prevented with one simple solution

Attackers may be able to infiltrate the network, but if organizations properly employed two-factor authentication the data would still be safe.

frequent flier traveler stock

Travelers beware: Hackers are after your information

Cyber criminals hoping to monetize frequent-flier miles and other rewards target jetlagged travelers in recent data breaches.

cybersecurity

Experts pick the top 5 security threats for 2015

Who could top the Sony hack? Someone will surely try. Experts weigh in on the most likely security exploits for the new year.

sonypictureshack 100535654 orig

What the Sony hack can teach us about protecting our email

Any electronic communication, no matter how private, could eventually be made public.

hackers

Clean up your Wordpress plugins to avoid SoakSoak and other malware threats

More than 100,000 Wordpress websites have been compromised as a result of unused or insecure plugins.

byod security

Box's Box Trust and Box EMM offer better BYOD security

Box's corporate customers need help managing the relentless growth of online storage and applications, let alone the mobile devices that access them.

mobile security

Report: iOS users care more about privacy and data security than Android users

Okay, but why? Data collected by cloud storage provider iDrive demonstrates that iOS users are more likely to back up data and use available privacy controls than their Android-using peers.

cybersecurity stock image

Beware this online shopping scam: Fake order confirmations

Cybercriminals are taking advantage of the holiday shopping frenzy to trick you into clicking a link you'll regret later.

experian

Data breach trends for 2015: Credit cards, healthcare records will be vulnerable

Ironically, a safer kind of credit card could spur a last-ditch wave of exploits for older cards. And who's watching your electronic medical records?

The Regin malware threat: Real protections against a mysterious danger

Regin's a puzzle, with a long career that apparently has yet to affect the U.S. If that should happen, however, the classic protective measures will be your best defense.

malware primary

Report: IT pros are overly confident that they know how to prevent data breaches

The data breaches of 2014 have put all IT professionals on alert, but it's hard to tell whether they're as prepared as they think they are. Putting your own defenses in place is your best insurance.

hacker hand

DarkHotel malware attacks target poorly secured networks, especially in hotels

DarkHotel's strategy is primitive but powerful, seeking out highly placed corporate users via vulnerable public networks. But there is a way to stay safe.

internet of things iot stock

Internet of Things security will be imperative as wearables, automobiles and more sign on

A survey by Intel Security shows great expectations for future IoT devices, but the things we’ll need to protect will become increasingly personal.