Tony BradleyPCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.

hackers

Clean up your Wordpress plugins to avoid SoakSoak and other malware threats

More than 100,000 Wordpress websites have been compromised as a result of unused or insecure plugins.

byod security

Box's Box Trust and Box EMM offer better BYOD security

Box's corporate customers need help managing the relentless growth of online storage and applications, let alone the mobile devices that access them.

mobile security

Report: iOS users care more about privacy and data security than Android users

Okay, but why? Data collected by cloud storage provider iDrive demonstrates that iOS users are more likely to back up data and use available privacy controls than their Android-using peers.

cybersecurity stock image

Beware this online shopping scam: Fake order confirmations

Cybercriminals are taking advantage of the holiday shopping frenzy to trick you into clicking a link you'll regret later.

experian

Data breach trends for 2015: Credit cards, healthcare records will be vulnerable

Ironically, a safer kind of credit card could spur a last-ditch wave of exploits for older cards. And who's watching your electronic medical records?

The Regin malware threat: Real protections against a mysterious danger

Regin's a puzzle, with a long career that apparently has yet to affect the U.S. If that should happen, however, the classic protective measures will be your best defense.

malware primary

Report: IT pros are overly confident that they know how to prevent data breaches

The data breaches of 2014 have put all IT professionals on alert, but it's hard to tell whether they're as prepared as they think they are. Putting your own defenses in place is your best insurance.

hacker hand

DarkHotel malware attacks target poorly secured networks, especially in hotels

DarkHotel's strategy is primitive but powerful, seeking out highly placed corporate users via vulnerable public networks. But there is a way to stay safe.

internet of things iot stock

Internet of Things security will be imperative as wearables, automobiles and more sign on

A survey by Intel Security shows great expectations for future IoT devices, but the things we’ll need to protect will become increasingly personal.

currentc

CurrentC is DOA before it’s even launched

CurrentC wants to go head-to-head with Apple to become the mobile payment system of choice, but it's suffered a data breach of customer data before it’s even launched.

autoupdate 100527222 resized

Report: Many Windows automatic updates are thwarted by user inaction

Windows automatic updates don’t work if you never restart the PC, and yet that seems to be the bottleneck for many, according to a survey of 4,500 Windows users

Windows patch

What you need to know about new zero day that hits most supported Windows versions

Microsoft issued a security advisory for the vulnerability, which resembles a flaw exploited in the Sandworm cyber espionage attacks.

fido alliance u2f usb authentication oct 2014

How a USB key drive could remove the hassles from two-factor authentication

Thanks to the FIDO Alliance's U2F open standard, a key drive or other small device could become a convenient, yet safe, authentication tool. The standard is backed by Google, Microsoft, Mastercard, Visa, PayPal and others,

poodle attack

POODLE’s bark is bigger than its bite

A flaw in the SSL encryption protocol leaves vulnerable systems open to attack, but it’s an old, outdated protocol that most systems no longer use.

3 simple ways two-factor authentication can protect you when no one else will

Two-factor authentication helps you protect your online identity even when the companies you do business with are breached or leak your data.