Tag: security

Powered by TechAbout

125 Stories

Worst IT security breaches debriefed

Worst IT security breaches debriefed

When the enemy is a moving target it's often only possible to look at the past to try to predict...

Microsoft finding success in “neighborhood watch” against botnets

Microsoft finding success in “neighborhood watch” against botnets

While national and worldwide agencies wage a war against online crime through the criminal courts, Microsoft is finding success using...

The latest reality of online safety: we’re all being watched

The latest reality of online safety: we’re all being watched

There are so many threats to online security and privacy that many have simply given up on the notion of...

Is online banking as safe as people think?

Is online banking as safe as people think?

More US adults bank online than use social networks (for now, at least). It has become such a common activity...

As the workforce goes mobile, security concerns rise

As the workforce goes mobile, security concerns rise

As more offices become virtual and more employees work from home or on the go, the logistics of keeping devices...

Online payments may be the future, but today consumers are still concerned

Online payments may be the future, but today consumers are still concerned

It's clear that online payments are the future. Many pay for nearly everything online, but there are still security and...

4Chan is back up after 3 day DDoS attack

4Chan is back up after 3 day DDoS attack

It isn't the first time that 4Chan has gone down and it won't be the last, but this one is...

Everything you needed to know about firewalls

Everything you needed to know about firewalls

The term "firewall" has one that most people know but few understand. It's often confused with anti-virus software because of...

As internet criminal activity decreases, botnets skyrocket

As internet criminal activity decreases, botnets skyrocket

Everyone has heard of hackers, viruses, and spam. What fewer people have heard of or understand are botnets despite statistics...

American drone weapons consoles infected with keystroke-logging virus

American drone weapons consoles infected with keystroke-logging virus

US Predator and Reaper drones in Afghanistan were hacked and a virus inserted into their remote cockpits at Creech Air...

Links on Facebook to be screened for viruses

Links on Facebook to be screened for viruses

Phishers and hackers have found that social media is a great place to plant links to malicious websites as unsuspecting...

Warning: MySQL.com was hacked, serves extremely malicious malware

Warning: MySQL.com was hacked, serves extremely malicious malware

With over 12 million monthly visitors, word must get out to keep people from going to MySQL(dot)com until they get...

Standing behind your product, one bullet at a time

Standing behind your product, one bullet at a time

With wars and battle zones popping up across the world, the security and defense industries have been booming over the...

The mobile malware menace

The mobile malware menace

As mobile technology continues to become more prevalent in use and present in our hands, so too do the "bad...

How to make a strong password

How to make a strong password

  They are the keys we use to get to some of the most important parts of our online lives....

The truth about passwords

The truth about passwords

The science behind hacking passwords has evolved much faster than the passwords themselves. While many websites and programs set limits...

The social network security test

The social network security test

Security is always a concern online, but on social networks it's doubly so as we put more and more personal...

10 tips to keep your family safe online

10 tips to keep your family safe online

Safety has been a concern online since kids started showing their parents how to surf. Now, as adults are realizing...

Big names top list for insecure data storage on apps

Big names top list for insecure data storage on apps

App watchdog group ViaForensics has been running popular Android and iPhone apps through their system to see who is encrypting...

Hackers take credit for Playstation network attack, claim possession of credit card data

Hackers take credit for Playstation network attack, claim possession of credit card data

If you're an active Sony Playstation network user, you're aware that it was "game over" last week as hackers made...