Once again we come back to the very real threat this kind of malware presents to the small- to medium-sized business who will very commonly use these kinds of free and open source tools to build up and maintain their online presence.
It's fairly safe to assume that calendars, call logs, contacts, emails, financial data, text messages, photos and videos stored on smartphones or mobile devices are at risk of being monitored or stolen.
If and when a cybersecurity bill moves to the Senate, the story about House passage of CISPA should not be about failure.
In 2009, my friend Mike was getting into bitcoin and I remember him explaining the whole concept to me: A virtual currency managed by a peer-to-peer network open to anyone with a computer and uncontrolled by any bank or government.
If you are entrusted with data, do take the time to understand the processes and procedures which are in place to protect the data.
"The Good Wife" took on several hot button issues with "Rape: A Modern Perspective." It was like the writers looked at what they had done all season and decided they weren't topical enough, so they threw together this episode.
There's nothing wrong with a little paranoia when it comes to keeping data on your smartphone safe. Thankfully, an award-winning mobile security software will keep you safe from unnecessary headaches.
The threat landscape has changed from noisy, messy worm attacks to stealthy, sophisticated, state-funded attacks, with major organizations such as Google, Microsoft, Apple, The New York Times and our government as victims.
While the unprecedented expansion of the Internet has brought the world closer together, it's also created daunting new challenges for security.
The international hacker organization Anonymous perpetuated possibly its most foolhardy act yesterday when it hacked into and took over North Korea's Flickr and Twitter accounts.
Reporters Without Borders has been investigating countries that operate some of the most restrictive and oppressive areas of cyberspace. Syria and Iran join China, Bahrain and Vietnam on top of the list of five spy state. But how do they manage it?
In the discussions about cyber threats that continue and expand daily, there is a tendency to lump together all types of threat regardless of where they fall on the spectrum.
Mobile connectivity is exploding and smartphones and tablets are whetting the appetites of cyber criminals and the population of hacker world. Any device that has information stored on it is vulnerable.
As people continue to share increasingly personal information online, it's easy to miss the dangers presented by sharing information with many websites they visit.
Every time you go to a new doctor or dentist and they give you a clipboard brimming with documents to fill out and sign, notice how they always ask for your Social Security number? Do you dutifully give it up? Did you ever wonder if they really need it?