iOS app Android app

Internet Security

Why Internet Security Matters

William Saito | Posted 01.22.2015 | Technology
William Saito

If we do not deal with this problem, the risks are enormous. First businesses and then the public will lose faith in everything they see on their screens, and the Internet will cease to function as perhaps the most useful tool ever created.

China Obliged by Its 'Internet Sovereignty' Policy to Aid U.S. Against North Korea

Nathan Gardels | Posted 12.22.2014 | World
Nathan Gardels

China's leaders need to look hard at the "Chinese Dream" they are trying to realize for their country and decide if that dream rests more on cooperation at this defining moment with the world's other largest economy, the United States, or on an absurd and outdated allegiance to the bizarre and historically obsolete feudal regime of the Kim family in Pyongyang.

Google Uncovers Bug In Widely Used Web Encryption Technology

Reuters | Jim Finkle | Posted 10.14.2014 | Technology

By Jim Finkle BOSTON, Oct 14 (Reuters) - Three Google Inc researchers have uncovered a security bug in widely used web encryption technology that t...

Gerry Smith

Cops Gave Parents Child Safety Software That Can Be Used For Spying

HuffingtonPost.com | Gerry Smith | Posted 10.03.2014 | Technology

Law enforcement agencies across the country have given away computer software to families that puts them at risk of spying, according to a new report....

WARNING: The Internet Might End in December

Peter Schwartz | Posted 11.22.2014 | World
Peter Schwartz

The challenger countries will once again try, as they did last December in Dubai, to wrest control from the coalition of stakeholders that has been governing the Internet under a contract with the U.S. government. If they succeed it will be the end of the world as we know it. There will be no Internet. There will be many nets: ChinaNet, Euronet, maybe Deutsche Net and France net and Brazil Net and Russia Net. It will resemble the world before the Internet with many private networks and a constant challenge of interconnection.

Protect Your Small Business From Being A Target

Michael Hall | Posted 09.17.2014 | Small Business
Michael Hall

This only happens to large businesses, right? Wrong.

New Trend: Be Invisible Online

John P. David | Posted 11.11.2014 | Technology
John P. David

Businesses spend years and millions of dollars making it easier for customers to find them online, but an emerging trend suggests they also are seeking ways to be invisible.

The Big Lie Behind the Biggest Data Breaches

CreditSesame.com | Posted 11.02.2014 | Business
CreditSesame.com

Enough with the data breach excuses already. Not only are they as jaded as the breaches themselves, they're often just not true. In the aftermath of almost every data breach, chances are you're only going to get a boilerplate public statement.

Protecting the Internet of Everything From Smarter, Shadier And Stealthier Attacks

Joshua McCloud | Posted 09.10.2014 | Impact
Joshua McCloud

If you've ever plugged an American, 110-volt appliance into a European 220-volt socket, you've experienced firsthand what happens when an electrical device overloads: fizzle, pop, smoke. At best, you've temporarily damaged the appliance. At worst, the device catches fire and burns the place down.

Gerry Smith

New Flaw Found in Software That Caused Heartbleed Bug

HuffingtonPost.com | Gerry Smith | Posted 06.06.2014 | Technology

Two months after the Heartbleed bug triggered widespread Internet panic, a researcher on Thursday disclosed a new vulnerability in the same widely use...

Another Security Hole Hits The Internet

Wired | Posted 06.05.2014 | Technology

The internet is still reeling from the discovery of the Heartbleed vulnerability, a software flaw exposed in April that broke most implementations of ...

When A Heartbleed Strikes, It's Everyone's Responsibility

Jeffrey Lyon | Posted 07.01.2014 | Technology
Jeffrey Lyon

As the conversations surrounding the Heartbleed bug continue to multiply, and as is the case with any widespread security breach, individually, we are often left with a lingering question: Who caused this and who is responsible for fixing the problem?

Data Breaches: Why Assigning Blame Is a Zero-Sum Game

Adam Levin | Posted 06.29.2014 | Technology
Adam Levin

Instead of playing the data breach blame game, you need to take control of the situation. Do a few simple things every day and make yourself a tougher get, have the tools to quickly determine if you are in harm's way and have a solution in place to deal with the fallout.

Heartbleed: Just Another Technobug Bump in the Road

Brandi Andres | Posted 06.11.2014 | Technology
Brandi Andres

The difficult-to-notice vulnerability of Heartbleed had been there for years before the greater threat was announced to the general public. Now that everyone knows it exists, companies are scrambling to fix it.

How to Protect Against the Heartbleed Security Flaw (Slideshow)

Larry Magid | Posted 06.11.2014 | Technology
Larry Magid

First, don't panic. This is a serious problem but you need to put it into perspective. While there is clearly a vulnerability, there are so far no reports of the flaw being exploited. And even though this flaw has been around for the past two years, almost all the major sites have fixed it -- in some cases, in the last few days.

How to Remember All the Passwords You're Resetting

Adam Levin | Posted 06.11.2014 | Technology
Adam Levin

So if you're in the midst of changing passwords, now's a good time to start a password system, rather than picking one new, universal password.

Heartbleed: A Teachable Moment About Passwords

Diana Graber | Posted 06.10.2014 | Parents
Diana Graber

Why not use Heartbleed as reason to talk to your kids about how and why to make safe and secure passwords in the first place?

9 Ways You're Being Spied On Every Day

2013-02-21-grandparentslogo.jpg | Sara Schwartz | Posted 04.03.2014 | Fifty

SPECIAL FROM Grandparents.com Casinos. Banks. Airports. We all know there are public places where we're being watched, ostensibly for crime-prevent...

Yik Yak App Makers Do the Right Thing

Diana Graber | Posted 05.26.2014 | Parents
Diana Graber

My 18-year-old daughter, who, like many, downloaded the app after it became an overnight sensation, told me that within 24 hours of the lockdown, kids trying to use the app anywhere on or near the school could not. Curious about this, I contacted Yik Yak and spoke to co-founder Brooks Buffington.

The Surprising Mistake Post 50s Are Making Online

Posted 10.23.2013 | Fifty

Just because they're considered "mature adults" doesn't mean post 50s are immune to the same kind of drama endured by teens on Facebook. A new survey ...

And What's Your Mother's Maiden Name?

Neale Godfrey | Posted 11.12.2013 | Fifty
Neale Godfrey

dentity theft can be accomplished as simply as someone getting information from your charge receipt or stealing your credit card. But, as more safeguards have been implemented, thieves have become more sophisticated.

New NSA Revelations Prompt Call For Security Revamp

Reuters | Posted 11.08.2013 | Technology

By Joseph Menn SAN FRANCISCO (Reuters) - Internet security experts are calling for a campaign to rewrite Web security in the wake of di...

Dreaming in the Digital Age: The Impact of New Database Technologies

Kelly Bulkeley, Ph.D. | Posted 08.13.2013 | Technology
Kelly Bulkeley, Ph.D.

If privacy protection is taken as the shared responsibility of both the participant and the database host, the risks don't disappear, but they shrink down to a size that makes it possible to balance them with the upside potentials.

Why We Wrote 'Viral Hate'

Abraham H. Foxman | Posted 08.04.2013 | Books
Abraham H. Foxman

While it is a marvelous medium for education, communication, entertainment and commerce, the ways in which the Internet is being used to disseminate and promote hateful and violent beliefs and attitudes are astounding, varied and continually multiplying.

Translating Good Intentions Into Effective Cybersecurity Policy

Scott Charney | Posted 08.03.2013 | Technology
Scott Charney

Governments around the world are considering regulatory changes in an effort to reduce cybersecurity risk; in fact, more than 40 governments are worki...