iOS app Android app

Internet Security

Protecting the Internet of Everything From Smarter, Shadier And Stealthier Attacks

Joshua McCloud | Posted 07.07.2014 | Impact
Joshua McCloud

If you've ever plugged an American, 110-volt appliance into a European 220-volt socket, you've experienced firsthand what happens when an electrical device overloads: fizzle, pop, smoke. At best, you've temporarily damaged the appliance. At worst, the device catches fire and burns the place down.

Gerry Smith

New Flaw Found in Software That Caused Heartbleed Bug

HuffingtonPost.com | Gerry Smith | Posted 06.06.2014 | Technology

Two months after the Heartbleed bug triggered widespread Internet panic, a researcher on Thursday disclosed a new vulnerability in the same widely use...

Another Security Hole Hits The Internet

Wired | Posted 06.05.2014 | Technology

The internet is still reeling from the discovery of the Heartbleed vulnerability, a software flaw exposed in April that broke most implementations of ...

When A Heartbleed Strikes, It's Everyone's Responsibility

Jeffrey Lyon | Posted 07.01.2014 | Technology
Jeffrey Lyon

As the conversations surrounding the Heartbleed bug continue to multiply, and as is the case with any widespread security breach, individually, we are often left with a lingering question: Who caused this and who is responsible for fixing the problem?

Data Breaches: Why Assigning Blame Is a Zero-Sum Game

Adam Levin | Posted 06.29.2014 | Technology
Adam Levin

Instead of playing the data breach blame game, you need to take control of the situation. Do a few simple things every day and make yourself a tougher get, have the tools to quickly determine if you are in harm's way and have a solution in place to deal with the fallout.

Heartbleed: Just Another Technobug Bump in the Road

Brandi Andres | Posted 06.11.2014 | Technology
Brandi Andres

The difficult-to-notice vulnerability of Heartbleed had been there for years before the greater threat was announced to the general public. Now that everyone knows it exists, companies are scrambling to fix it.

How to Protect Against the Heartbleed Security Flaw (Slideshow)

Larry Magid | Posted 06.11.2014 | Technology
Larry Magid

First, don't panic. This is a serious problem but you need to put it into perspective. While there is clearly a vulnerability, there are so far no reports of the flaw being exploited. And even though this flaw has been around for the past two years, almost all the major sites have fixed it -- in some cases, in the last few days.

How to Remember All the Passwords You're Resetting

Adam Levin | Posted 06.11.2014 | Technology
Adam Levin

So if you're in the midst of changing passwords, now's a good time to start a password system, rather than picking one new, universal password.

Heartbleed: A Teachable Moment About Passwords

Diana Graber | Posted 06.10.2014 | Parents
Diana Graber

Why not use Heartbleed as reason to talk to your kids about how and why to make safe and secure passwords in the first place?

9 Ways You're Being Spied On Every Day

2013-02-21-grandparentslogo.jpg | Sara Schwartz | Posted 04.03.2014 | Fifty

SPECIAL FROM Grandparents.com Casinos. Banks. Airports. We all know there are public places where we're being watched, ostensibly for crime-prevent...

Yik Yak App Makers Do the Right Thing

Diana Graber | Posted 05.26.2014 | Parents
Diana Graber

My 18-year-old daughter, who, like many, downloaded the app after it became an overnight sensation, told me that within 24 hours of the lockdown, kids trying to use the app anywhere on or near the school could not. Curious about this, I contacted Yik Yak and spoke to co-founder Brooks Buffington.

The Surprising Mistake Post 50s Are Making Online

Posted 10.23.2013 | Fifty

Just because they're considered "mature adults" doesn't mean post 50s are immune to the same kind of drama endured by teens on Facebook. A new survey ...

And What's Your Mother's Maiden Name?

Neale Godfrey | Posted 11.12.2013 | Fifty
Neale Godfrey

dentity theft can be accomplished as simply as someone getting information from your charge receipt or stealing your credit card. But, as more safeguards have been implemented, thieves have become more sophisticated.

New NSA Revelations Prompt Call For Security Revamp

Reuters | Posted 11.08.2013 | Technology

By Joseph Menn SAN FRANCISCO (Reuters) - Internet security experts are calling for a campaign to rewrite Web security in the wake of di...

Dreaming in the Digital Age: The Impact of New Database Technologies

Kelly Bulkeley, Ph.D. | Posted 08.13.2013 | Technology
Kelly Bulkeley, Ph.D.

If privacy protection is taken as the shared responsibility of both the participant and the database host, the risks don't disappear, but they shrink down to a size that makes it possible to balance them with the upside potentials.

Why We Wrote 'Viral Hate'

Abraham H. Foxman | Posted 08.04.2013 | Books
Abraham H. Foxman

While it is a marvelous medium for education, communication, entertainment and commerce, the ways in which the Internet is being used to disseminate and promote hateful and violent beliefs and attitudes are astounding, varied and continually multiplying.

Translating Good Intentions Into Effective Cybersecurity Policy

Scott Charney | Posted 08.03.2013 | Technology
Scott Charney

Governments around the world are considering regulatory changes in an effort to reduce cybersecurity risk; in fact, more than 40 governments are worki...

Guns and Cyber Security

Steve Blank | Posted 07.15.2013 | Business
Steve Blank

The online world can be a dangerous place for the unprepared. And it's just going to get worse. It's time to teach cyber security as integral part of the high school and college curriculum and to all corporate employees.

The Jodi Arias, Anthony Weiner and Snapchat Guide to Creating Lasting Digital Memories

Russ Warner | Posted 06.19.2013 | Technology
Russ Warner

Parents need a cursory understanding of the complex, virtual world in which we live in order to provide guidance. Don't let a stranger educate your child the hard way about such technologies.

Top Ways Kids Hide Their Online Behavior From Parents

Russ Warner | Posted 06.16.2013 | Technology
Russ Warner

Parents should openly discuss the use of technology with their kids. A parent has the right to protect a child (as the parent). You would establish rules for the use of the family car, right?

Toward a Global Approach to Cybersecurity

Scott Charney | Posted 05.26.2013 | Technology
Scott Charney

The challenges are immediate and well-known, but the ingredients for more effective cybersecurity are within our grasp. It's important to understand two of the elements that are shaping our collective response to cybersecurity challenges

Tech Superstardom Vs. Hacking Criminal

AP | GARANCE BURKE | Posted 05.16.2013 | Los Angeles

SAN FRANCISCO — Federal prosecutors say Reuters' deputy social media editor conspired with a notorious hacker network to cause an online securit...

Looks Like They're Not So Anonymous Anymore

AP | Posted 03.26.2013 | Technology

LONDON (AP) — A 22-year-old member of the Anonymous movement has been jailed for 18 months for taking part in high-profile cyberattacks on several m...

Oracle Issues Java Fix, But Is Still In Hot Water

AP | RYAN NAKASHIMA | Posted 03.16.2013 | Technology

LOS ANGELES — Oracle Corp. said Monday it has released a fix for the flaw in its Java software that raised an alarm from the U.S. Department of ...

9 Ways Disconnecting Doesn't Make You Any Safer

Adam Levin | Posted 03.11.2013 | Technology
Adam Levin

As we begin 2013, it's worth remembering how much is beyond our control. The most fastidious, organized and self-protective among us are vulnerable every minute of every day.