Tony BradleyPCWorld

Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.

teenager looking at cell phone sextortion stock image

The rise of sextortion: Nude selfies are fun until someone gets blackmailed

Attackers are using online dating services to convince lonely people to send nude photos, and that's when the blackmail begins.

hack security malware

Ransomware alert: 'Pacman' scheme uses Dropbox link to gobble victims

A single click sets Pacman in motion, demanding ransom in Bitcoin within 24 hours.

android malware

Run this Installer Hijacking Scanner app to see if your older Android phone is at risk

Half of all Android phones still run Android 4.2 or older. If they also buy from third-party app stores, they could be vulnerable to a hijacking app. This scanner will tell you if your phone is at risk.

ncaa march madness live

March Madness inspires brackets, team spirit, and cyber crime

Attackers look for ways to exploit the high demand and popularity of the NCAA college basketball playoffs.

hillary clinton

3 BYOD mistakes Hillary Clinton made, and how your BYOD policy can avoid them

Oh Hillary: You really thought using your own phone and your personal email address while serving as Secretary of State would be OK?

Over a million Wordpress sites at risk thanks to WP-Slimstat plugin

A critical flaw in the WP-Slimstat plugin could allow attackers to completely hijack vulnerable Wordpress sites.

password stock image

Password security tips: When and how to share them safely with loved ones

Your passwords are one kind of secret you probably need to keep, even from trusted loved ones. A new survey from Intel Security reveals people's habits and the risks they might be taking.

securetaxes primary

Quick! File your taxes before a hacker does it for you

There is a rise in fraudulent tax returns being filed by hackers armed with personal information from data breaches.

5 things all Anthem customers should do after the massive data breach

There's help for the 80 million individuals who could be affected by the Anthem data breach. A few proactive steps can help you stay alert to any attempted crimes using your personal data.

hacker hand

New phishing scam preys on fear of child sexual predators

Cyber criminals use a sensitive topic to lure concerned parents into clicking something they shouldn't.

microsoft office logo feb 2015

Office Online vs. Office 365: What’s free, what’s not, and what you really need

Free Office Online is a great deal, but paying for an Office 365 subscription gives you some hard-to-beat perks. We’ll help you decide which way to go.


Selling passwords for $150, and other dumb ways users threaten corporate security

Ironically, the same employees surveyed who were often lax on corporate security were nevertheless vigilant about their own digital security.


Obama supports cybersecurity and privacy, but experts warn of unintended impacts

Calls for better information sharing and data breach reporting, and better cybercrime-fighting tools, could hamper innovation or infringe on privacy, experts caution.

fido alliance u2f usb authentication oct 2014

Data breaches can be prevented with one simple solution

Attackers may be able to infiltrate the network, but if organizations properly employed two-factor authentication the data would still be safe.

frequent flier traveler stock

Travelers beware: Hackers are after your information

Cyber criminals hoping to monetize frequent-flier miles and other rewards target jetlagged travelers in recent data breaches.