iOS app Android app

Online Security

Trulioo, Making Trust Online an Option

Nancy Laws | Posted 04.03.2015 | Technology
Nancy Laws

Online security is a worry for all of us, but entrepreneurs with the goal of building a strong customer base worries even more, because consumers, rightfully so, have a lot to worry about when it comes to fraud and more.

Every Day Should Be 'Safer Internet Day'

Diana Graber | Posted 04.13.2015 | Parents
Diana Graber

So I like Annie Fox's suggestion that we "vaccinate kids before they play on the Internet." Let's actually give them the 21st Century skills we keep talking about.

These Are The Worst Passwords You Could Have

The Huffington Post | Damon Beres | Posted 01.20.2015 | Technology

If your password is on this list, you should change it.

Your Password is a Big Problem

Evan Tann | Posted 03.17.2015 | Technology
Evan Tann

The unprecedented rise of the connected age, like any big societal change, leads to unexpected and dramatic questions about safety and security. But the concept of security requires innovators and their products' users to work together.

Gerry Smith

Shopping Online May Actually Be Safer Than Shopping In Person

HuffingtonPost.com | Gerry Smith | Posted 09.15.2014 | Technology

The list of major retailers that have been hacked keeps growing. But while tens of millions of people have seen their credit card numbers fall into th...

Grindr, OkCupid Are Failing To Take This Basic Security Measure, Researchers Say

The Huffington Post | Kerry Flynn | Posted 09.09.2014 | Technology

Top social and dating apps, including Instagram, OkCupid, GroupMe, and Grindr, could give hackers access to what users think are private messages, acc...

Are Those Security Questions Begging You to Lie?

Adam Levin | Posted 11.05.2014 | Technology
Adam Levin

As the smoke clears from this latest attack on privacy and our collective sense of decency, it's becoming more and more likely that a deft use of personally identifiable information was used to unlock the nude celebrity photo troves that flooded the Internet.

Can One of These Obsessions Get You Scammed?

Adam Levin | Posted 10.22.2014 | Technology
Adam Levin

We all have our areas of interest -- make that obsession -- and when something related to them crops up online, we can be instantly transformed into monster click machines. The problem here: Many of those clicks can either lead to your victimization or becoming an unwitting co-conspirator in cybercrime.

4 Misconceptions About Cloud Based POS Systems

Shane Paul Neil | Posted 10.21.2014 | Business
Shane Paul Neil

For the uninitiated, a POS system is simply a computerized network operated by a main computer and linked to several checkout terminals. Cloud based systems have moved that main computer off site, typically to a number of servers hosted and maintained by a third party service.

Change Your Password With LEET

Shelly Palmer | Posted 10.18.2014 | Technology
Shelly Palmer

I am an advocate of strong passwords -- inconvenient, long, strong passwords.  7-1d7w!Ka was my Yahoo! password until a few hours ago.  Can you guess the phrase I based it on?  Hint: It's written in LEET and it is a famous phrase from the 1939 movie classic, The Wizard of Oz.  Got it?

Who Should We Fear, Big Brother or Big Data?

Meryl Chertoff | Posted 07.29.2014 | Technology
Meryl Chertoff

There is a growing discomfort with this loss of privacy.

Geo-Fencing: Just One Tool to Protect Kids From Cyber Bullying

Diana Graber | Posted 06.29.2014 | Parents
Diana Graber

I'll be the first to admit it, parents today need all the help they can get, especially when it comes to keeping track of our kids and their behaviors, virtually and physically. But just like a physical fence can be scaled or circumvented, so can a virtual fence

These Online Security Tips Are Terrible

The Huffington Post | Carol Hartsell | Posted 04.21.2014 | Comedy

Are you concerned about your internet security in the wake of Heartbleed? Then watch this video above to find out everything you should NOT do to prot...

How to Protect Against the Heartbleed Security Flaw (Slideshow)

Larry Magid | Posted 06.11.2014 | Technology
Larry Magid

First, don't panic. This is a serious problem but you need to put it into perspective. While there is clearly a vulnerability, there are so far no reports of the flaw being exploited. And even though this flaw has been around for the past two years, almost all the major sites have fixed it -- in some cases, in the last few days.

The Mad State of Malware

Joe Ross | Posted 05.13.2014 | Technology
Joe Ross

When protecting against any type of malware, education is the first step. Employees should be coached on the causes and effects of these types of malware, how they are being transmitted and what to do if they think their device might be compromised.

Email Follies Plague Corporate America

Daniel Garrie | Posted 04.08.2014 | Technology
Daniel Garrie

It is beyond refute that for every email sent, there's an excellent chance that someone, or many persons, may have kept a copy.

The Surprising Mistake Post 50s Are Making Online

Posted 10.23.2013 | Fifty

Just because they're considered "mature adults" doesn't mean post 50s are immune to the same kind of drama endured by teens on Facebook. A new survey ...

Consider the NSA, Facebook, Google, Microsoft and JC Penney -- Who Can You Trust?

Navin Nagiah | Posted 11.25.2013 | Technology
Navin Nagiah

This is both a problem and a debate that won't go away any time soon. How much security do we need? How much liberty are we willing to give up for that security? Who makes that determination?

Sharing a Back-to-School Poem

Hemanshu Nigam | Posted 11.06.2013 | Parents
Hemanshu Nigam

A child can grow empowered with the skills, experiences, and mind-set needed to tackle the world whether confronted by an intellectual challenge, a physical impediment or an online safety, security or privacy dilemma.

The First Word I Ever Googled: Why Online Privacy Is an LGBT Issue

Allyson D. Robinson | Posted 11.10.2013 | Gay Voices
Allyson D. Robinson

The network these brave LGBT troops were building, using a new generation of social tools like Facebook, was strong, but it had one glaring weakness: Its security was completely dependent upon the policies and the precautions put in place by the companies that hosted it.

The Tweet That Helped a Criminal Break into Jail

Hemanshu Nigam | Posted 10.09.2013 | Crime
Hemanshu Nigam

The Internet represents a double-edged sword for police, providing endless clues to criminal activities while offering criminals countless opportunities to prey upon victims.

Google Chrome Has A Huge Security Hole

The Huffington Post | Dino Grandoni | Posted 08.08.2013 | Technology

Google Chrome, the most popular web browser in the U.S., lets you save passwords for websites, so that every time you want to visit Facebook, Tumblr o...

Here's How Easily Someone Could Hack Into Your Life (INFOGRAPHIC)

Posted 10.18.2013 | Entertainment

If you're reading this, there's 69 percent chance you will become a victim of hacking at some point in your lifetime. And if you think protecting your...

The Internet Knows More About You Than You Think (INFOGRAPHIC)

Posted 10.18.2013 | Entertainment

Paranoid about your online footprint? You should be. It's easier than ever for cyber thieves to access your personal data, and something as simple and...

Why Online Privacy, Confidentiality and Security Matter to LGBT Communities

Joe Kapp | Posted 07.16.2013 | Gay Voices
Joe Kapp

Until a teenager can come out without being bullied or kicked out of their home, or a gay employee need not fear being exposed by co-workers, online privacy, confidentiality and security issues will require the ongoing attention of technology businesses and policy makers alike.