5 ways to insecure passwords

Chances are high that you already take great steps to ensure that your network and systems are secure from threats. But, do you take the same steps to ensure that your accounts like email, social media, bank, etc. are also secure? The weakest link of these accounts is the password, and that’s exactly where most…

5 common virus myths dispelled

Computers, while used in nearly every office, still mystify the vast majority of users. Sure they know how to operate one, but when it comes to ideas like the Internet and viruses, malware, trojans, etc. most people are lost. This is largely because of the large number of myths and lies about things like viruses,…

Site tracks changes to Terms of Service

One of the more popular debates about the Internet is who exactly owns your data and information when it goes online? Most of the information regarding this is held in the Terms of Service, which most people click and agree to without reading. The interesting thing about this is that web oriented companies usually update…

Take steps to secure online info

Think of the everyday usual precautions you take. When you get into a car, you put on your seatbelt; when you leave the house, you lock the door, the list goes on and on. Yet, when it comes to online security, most people are content with a virus scanner, and do little about securing their…

Hunt for your devices with Prey

Imagine you are in the airport waiting for a flight when you look down only to discover that your laptop is missing. This isn’t a great thought, especially since many of us have important files and programs that we can’t afford to lose. The problem is, if your device has gone missing, the chances of…

17 million UPnP devices at risk

As technology continues its creep into every aspect of our life, the number of Internet connected devices we use is also growing. This has led to an increase in the number and severity of security threats facing networks. It seems that almost every week a new security threat is uncovered. One of the latest can…

Red October introduces advanced SpearPhishing techniques to cyber-espionage

During the past five years, a high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and scientific research organizations, gathering data and intelligence from mobile devices, computer systems and network equipment. Corporate Information Technologies (CIT) has also observed these infiltrations in commercial organizations, often unabated. “A layered cyber defense system that is capable…

Security flaws force many to cut Java

For as long as computers have been able to connect to the Internet, there have been security flaws and the two go hand-in-hand. Companies do their best to shore up security problems, and some do better than others. There’s one popular Internet based program that has had a slew of security issues in the past…