News, blogs, analysis, tips, discussion and how-to about online safety.
Mon, March 10, 2014 - An exploit for the SQL injection vulnerability has been publicly available for over a month, said security researchers from Sucuri
Fri, March 07, 2014 - National spy agencies across Europe are allowing the NSA to piece together their data into a larger picture, Snowden said
Tue, March 04, 2014 - Attackers have used a variety of techniques to exploit known vulnerabilities in router models from different manufacturers
Fri, February 28, 2014 - Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.
Thu, February 27, 2014 - Researchers signed an open letter outlining 10 transparency principles for companies to regain user trust following surveillance revelations
Wed, February 26, 2014 - The exploit is being distributed from many compromised websites around the world, researchers from Symantec said
Mon, February 24, 2014 - How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.
Fri, February 21, 2014 - In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.
Tue, February 18, 2014 - Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge.
Mon, February 17, 2014 - The list of affected router models is larger than previously thought
Thu, February 13, 2014 - The certificates could be used to launch man-in-the-middle attacks against desktop and mobile apps with poor certificate validation
Wed, February 12, 2014 - Your data. Your wallet. Your identity. In the darker corners of the Internet, it's all fair game, and disaster could be one unwitting click away. Protect yourself by learning about the web's most common dangers, and how to avoid them. Also, take some basic steps to make your PC more resistant to harm.
Wed, February 12, 2014 - The flaws could allow attackers to execute malicious code on computers remotely
Fri, February 07, 2014 - Attackers changed the DNS configuration of vulnerable home routers to mount man-in-the-middle attacks against users in Poland