iOS app Android app

Internet Security

The True Cost of Online Crime

John Powers | Posted 05.27.2016 | Technology
John Powers

Photo Credit: User:Colin / Wikimedia Commons / CC-BY-SA-4.0 You can't believe everything you read on the Internet. That's a lesson I learned long bef...

Is This The Best Wi-Fi Router Ever?

Stewart Wolpin | Posted 05.10.2016 | Technology
Stewart Wolpin

Does your home Wi-Fi suck? If it does (and it probably does), it could be you're not getting enough megs from your internet service provider (ISP). If...

Why 2016 Will Be an Even Scarier Year for Internet Security

Rami Essaid | Posted 01.27.2016 | Technology
Rami Essaid

The holiday decorations had barely been returned to the attic when 2016 already saw its first high-profile cyber attack. Time Warner Cable said on Jan...

Can Smart TVs Be Hacked?

Quora | Posted 12.17.2015 | Technology
Quora

As part of my job as a security response researcher in Symantec, I recently got a chance to experiment on a new generation smart TV to see how well it was secured against attacks. I quickly realized, that after a successful attack, I was looking at an ultimately unusable brand new TV infected with ransomware.

How To Hide An Identity In Plain Sight

Quora | Posted 11.10.2015 | Technology
Quora

To really hide online, you need to do it in plain sight. That means you will have to create an entire fake online persona -- on Facebook. Google, Twitter, even LinkedIn -- using this identity. Do not link any of those accounts to your actual identity or your real email address.

Understanding the Benefits and Limits of Internet Anonymity

Jonha Revesencio | Posted 10.15.2015 | Business
Jonha Revesencio

As much as possible, never use simple passwords or, worse, use the same one on all of your accounts. Even if they are complicated, some websites have less security in protecting passwords. It is hard to memorize many passwords, but this is for your own good and the protection of your identity.

Online Security: The Fundamental American Right of the 21st Century

Emmanuel Schalit | Posted 06.30.2015 | Technology
Emmanuel Schalit

Here in America, there is an unquestioned belief in the fundamental right to safety. It is built into the legal framework, and thus culture of America, that every citizen has the inalienable right to be protected from physical violence.

Treading Carefully in the 21st Century: The V.P.N.

Alex Simon | Posted 06.19.2016 | Technology
Alex Simon

As a result of the World Wide Web becoming the 21st century version of Central Park after midnight, increased security protocols have been invented and initiated. One of the most reliable and frequently used is the Virtual Private Network.

Want to Fend Off Cybercrooks? Wear Protection!

Michael L. Berman | Posted 05.22.2016 | Technology
Michael L. Berman

Every year at this time we anxiously await Symantec's Internet Security Threat Report, hoping that this would be the year that all cybercrooks would disappear. But, as usual, our hopes have been stomped upon by the facts.

Will the 'Internet of Things' Open Your Home to Hackers?

Jason Glassberg | Posted 06.22.2015 | Technology
Jason Glassberg

At this week's RSA Conference in San Francisco, the world's leading cyber minds aren't just focusing on international super-hackers and possible future attacks on the electric grid. Do you know what else they're worrying about? Your home.

Improve Your Internet Privacy In 15 Minutes

The Huffington Post | Alexis Kleinman | Posted 04.13.2015 | Technology

Being safer online isn't as hard as you might think.

Security Mistakes You Make Every Day

NextAdvisor.com | Posted 06.03.2015 | Technology
NextAdvisor.com

Although there is no foolproof way to prevent identity theft or other security risks, cutting down on the amount of easy-to-change mistakes you make on a daily basis can help make you less of a target.

11 Million Customers Hit In Latest Health Insurance Hack

Reuters | Jim Finkle | Posted 03.17.2015 | Technology

BOSTON, March 17 (Reuters) - Health insurer Premera Blue Cross said on Tuesday it was a victim of a cyberattack that may have exposed medical data and...

Is Innovation Killing Privacy?

Jonha Revesencio | Posted 04.05.2015 | Technology
Jonha Revesencio

If an app or technology doesn't provide any information as to how your private data are being treated, one must think twice before using them.

Women in Business Q&A: Denise G. Tayloe Co-Founder, CEO & President, PRIVO

Laura Dunn | Posted 03.30.2015 | Business
Laura Dunn

Denise G. Tayloe is a recognized leader and authority in online identity and privacy management with more than a decade of experience in the online pr...

Why Internet Security Matters

William Saito | Posted 03.24.2015 | Technology
William Saito

If we do not deal with this problem, the risks are enormous. First businesses and then the public will lose faith in everything they see on their screens, and the Internet will cease to function as perhaps the most useful tool ever created.

China Obliged by Its 'Internet Sovereignty' Policy to Aid U.S. Against North Korea

Nathan Gardels | Posted 02.21.2015 | World
Nathan Gardels

China's leaders need to look hard at the "Chinese Dream" they are trying to realize for their country and decide if that dream rests more on cooperation at this defining moment with the world's other largest economy, the United States, or on an absurd and outdated allegiance to the bizarre and historically obsolete feudal regime of the Kim family in Pyongyang.

Google Uncovers Bug In Widely Used Web Encryption Technology

Reuters | Jim Finkle | Posted 10.14.2014 | Technology

By Jim Finkle BOSTON, Oct 14 (Reuters) - Three Google Inc researchers have uncovered a security bug in widely used web encryption technology that t...

Gerry Smith

Cops Gave Parents Child Safety Software That Can Be Used For Spying

HuffingtonPost.com | Gerry Smith | Posted 10.03.2014 | Technology

Law enforcement agencies across the country have given away computer software to families that puts them at risk of spying, according to a new report....

WARNING: The Internet Might End in December

Peter Schwartz | Posted 11.22.2014 | World
Peter Schwartz

The challenger countries will once again try, as they did last December in Dubai, to wrest control from the coalition of stakeholders that has been governing the Internet under a contract with the U.S. government. If they succeed it will be the end of the world as we know it. There will be no Internet. There will be many nets: ChinaNet, Euronet, maybe Deutsche Net and France net and Brazil Net and Russia Net. It will resemble the world before the Internet with many private networks and a constant challenge of interconnection.

Protect Your Small Business From Being A Target

Michael Hall | Posted 09.17.2014 | Small Business
Michael Hall

This only happens to large businesses, right? Wrong.

New Trend: Be Invisible Online

John P. David | Posted 11.11.2014 | Technology
John P. David

Businesses spend years and millions of dollars making it easier for customers to find them online, but an emerging trend suggests they also are seeking ways to be invisible.

The Big Lie Behind the Biggest Data Breaches

CreditSesame.com | Posted 11.02.2014 | Business
CreditSesame.com

Enough with the data breach excuses already. Not only are they as jaded as the breaches themselves, they're often just not true. In the aftermath of almost every data breach, chances are you're only going to get a boilerplate public statement.

Protecting the Internet of Everything From Smarter, Shadier And Stealthier Attacks

Joshua McCloud | Posted 09.10.2014 | Impact
Joshua McCloud

If you've ever plugged an American, 110-volt appliance into a European 220-volt socket, you've experienced firsthand what happens when an electrical device overloads: fizzle, pop, smoke. At best, you've temporarily damaged the appliance. At worst, the device catches fire and burns the place down.

Gerry Smith

New Flaw Found in Software That Caused Heartbleed Bug

HuffingtonPost.com | Gerry Smith | Posted 06.06.2014 | Technology

Two months after the Heartbleed bug triggered widespread Internet panic, a researcher on Thursday disclosed a new vulnerability in the same widely use...