Tag: security

Powered by TechAbout

72 Stories

The 10 Most Notorious Hackers

The 10 Most Notorious Hackers

When we think of the term hacker, we are reminded of men in dark hoods, who hack into your systems,...

App security: how important is it?

App security: how important is it?

If you consider the amount of attempts to hack into government systems and databases, and how many times your personal...

Censorship on the internet: be your own watchdog

Censorship on the internet: be your own watchdog

There’s been a lot of focus, especially in the past year, on internet censorship. From the battle against online piracy...

Hacker group AntiSec leaks Apple device IDs to highlight FBI tracking

Hacker group AntiSec leaks Apple device IDs to highlight FBI tracking

If reports from the hacker group are to be believed, the FBI has over 12 million Unique Device Identifiers (UDIDs)...

Should two-factor authentication be utilized for all your accounts?

Should two-factor authentication be utilized for all your accounts?

The fear of hackers and privacy peeping toms has been quelled for the moment due to the unveiling of a...

Hotel keycards can be easily hacked in 200 milliseconds

Hotel keycards can be easily hacked in 200 milliseconds

With less than $50 of store-bought hardware and some programming, a hacker can gain instantaneous and untraceable access into over...

Top 5 security systems for 2012

Top 5 security systems for 2012

Quiz time: Did you know that a burglary occurs every 14.6 seconds in America? With the average dollar loss from...

Small businesses must take preventative measures to safeguard against hackers

Small businesses must take preventative measures to safeguard against hackers

Hackers are becoming increasingly clever and conniving, while small businesses remain shockingly naive about the threat they face from cyber-attacks....

WiFi security facts and figures

WiFi security facts and figures

WiFi has changed the world. We are no longer locked into proximity to wall outlets. We're not tied down by...

The history of encryption

The history of encryption

Sensitive data has always been a challenge to deliver securely. Even in the days of the Spartans, military commanders would...

Will online shopping ever be safe?

Will online shopping ever be safe?

As the madness of the holiday season dies down and the New Year gains pace, retailers will renew the cycle...

Worst IT security breaches debriefed

Worst IT security breaches debriefed

When the enemy is a moving target it's often only possible to look at the past to try to predict...

Microsoft finding success in “neighborhood watch” against botnets

Microsoft finding success in “neighborhood watch” against botnets

While national and worldwide agencies wage a war against online crime through the criminal courts, Microsoft is finding success using...

The latest reality of online safety: we’re all being watched

The latest reality of online safety: we’re all being watched

There are so many threats to online security and privacy that many have simply given up on the notion of...

Is online banking as safe as people think?

Is online banking as safe as people think?

More US adults bank online than use social networks (for now, at least). It has become such a common activity...

As the workforce goes mobile, security concerns rise

As the workforce goes mobile, security concerns rise

As more offices become virtual and more employees work from home or on the go, the logistics of keeping devices...

Online payments may be the future, but today consumers are still concerned

Online payments may be the future, but today consumers are still concerned

It's clear that online payments are the future. Many pay for nearly everything online, but there are still security and...

4Chan is back up after 3 day DDoS attack

4Chan is back up after 3 day DDoS attack

It isn't the first time that 4Chan has gone down and it won't be the last, but this one is...

Everything you needed to know about firewalls

Everything you needed to know about firewalls

The term "firewall" has one that most people know but few understand. It's often confused with anti-virus software because of...

As internet criminal activity decreases, botnets skyrocket

As internet criminal activity decreases, botnets skyrocket

Everyone has heard of hackers, viruses, and spam. What fewer people have heard of or understand are botnets despite statistics...