• Subscribe
The rise of sextortion: Nude selfies are fun until someone gets blackmailed

The rise of sextortion: Nude selfies are fun until someone gets blackmailed

Attackers are using online dating services to convince lonely people to send nude photos, and that's when the blackmail begins.

04/07/2015

Ransomware alert: 'Pacman' scheme uses Dropbox link to gobble victims

Ransomware alert: 'Pacman' scheme uses Dropbox link to gobble victims

A single click sets Pacman in motion, demanding ransom in Bitcoin within 24 hours.

04/03/2015

Run this Installer Hijacking Scanner app to see if your older Android phone is at risk

Run this Installer Hijacking Scanner app to see if your older Android phone is at risk

Half of all Android phones still run Android 4.2 or older. If they also buy from third-party app stores, they could be vulnerable to a hijacking app. This scanner will tell you if your phone is at risk.

03/25/2015

March Madness inspires brackets, team spirit, and cyber crime

March Madness inspires brackets, team spirit, and cyber crime

Attackers look for ways to exploit the high demand and popularity of the NCAA college basketball playoffs.

03/20/2015

3 BYOD mistakes Hillary Clinton made, and how your BYOD policy can avoid them

3 BYOD mistakes Hillary Clinton made, and how your BYOD policy can avoid them

Oh Hillary: You really thought using your own phone and your personal email address while serving as Secretary of State would be OK?

03/13/2015

Over a million Wordpress sites at risk thanks to WP-Slimstat plugin

Over a million Wordpress sites at risk thanks to WP-Slimstat plugin

A critical flaw in the WP-Slimstat plugin could allow attackers to completely hijack vulnerable Wordpress sites.

02/26/2015

Password security tips: When and how to share them safely with loved ones

Password security tips: When and how to share them safely with loved ones

Your passwords are one kind of secret you probably need to keep, even from trusted loved ones. A new survey from Intel Security reveals people's habits and the risks they might be taking.

02/17/2015

Quick! File your taxes before a hacker does it for you

Quick! File your taxes before a hacker does it for you

There is a rise in fraudulent tax returns being filed by hackers armed with personal information from data breaches.

02/13/2015

5 things all Anthem customers should do after the massive data breach

5 things all Anthem customers should do after the massive data breach

There's help for the 80 million individuals who could be affected by the Anthem data breach. A few proactive steps can help you stay alert to any attempted crimes using your personal data.

02/10/2015

New phishing scam preys on fear of child sexual predators

New phishing scam preys on fear of child sexual predators

Cyber criminals use a sensitive topic to lure concerned parents into clicking something they shouldn't.

02/06/2015

Selling passwords for $150, and other dumb ways users threaten corporate security

Selling passwords for $150, and other dumb ways users threaten corporate security

Ironically, the same employees surveyed who were often lax on corporate security were nevertheless vigilant about their own digital security.

01/30/2015

Obama supports cybersecurity and privacy, but experts warn of unintended impacts

Obama supports cybersecurity and privacy, but experts warn of unintended impacts

Calls for better information sharing and data breach reporting, and better cybercrime-fighting tools, could hamper innovation or infringe on privacy, experts caution.

01/22/2015

Data breaches can be prevented with one simple solution

Data breaches can be prevented with one simple solution

Attackers may be able to infiltrate the network, but if organizations properly employed two-factor authentication the data would still be safe.

01/19/2015

Travelers beware: Hackers are after your information

Travelers beware: Hackers are after your information

Cyber criminals hoping to monetize frequent-flier miles and other rewards target jetlagged travelers in recent data breaches.

01/19/2015

Experts pick the top 5 security threats for 2015

Experts pick the top 5 security threats for 2015

Who could top the Sony hack? Someone will surely try. Experts weigh in on the most likely security exploits for the new year.

01/14/2015

What the Sony hack can teach us about protecting our email

What the Sony hack can teach us about protecting our email

Any electronic communication, no matter how private, could eventually be made public.

12/23/2014

Clean up your Wordpress plugins to avoid SoakSoak and other malware threats

Clean up your Wordpress plugins to avoid SoakSoak and other malware threats

More than 100,000 Wordpress websites have been compromised as a result of unused or insecure plugins.

12/19/2014

Box's Box Trust and Box EMM offer better BYOD security

Box's Box Trust and Box EMM offer better BYOD security

Box's corporate customers need help managing the relentless growth of online storage and applications, let alone the mobile devices that access them.

12/18/2014

Report: iOS users care more about privacy and data security than Android users

Report: iOS users care more about privacy and data security than Android users

Okay, but why? Data collected by cloud storage provider iDrive demonstrates that iOS users are more likely to back up data and use available privacy controls than their Android-using peers.

12/12/2014

Beware this online shopping scam: Fake order confirmations

Beware this online shopping scam: Fake order confirmations

Cybercriminals are taking advantage of the holiday shopping frenzy to trick you into clicking a link you'll regret later.

12/08/2014

Load More