How to Break Bad: Cyber Security Style

It happened yesterday. The day we’ve all been dreading since we first saw Walt in his tighty whities. Breaking Bad came to an end. None…

Universities Go to School on Computer Security

Cyber security at a university can be a very different challenge than in a corporate environment. With an ongoing wave of cyber attacks, it is…

Hackers Find Fatal Flaw of Fingerprint Security

When Apple announced the Touch ID technology that rolled out with the new iPhone 5, it sounded like science fiction. Your phone can now be…

RIP Blackberry?

Once upon a time, the Blackberry from RIM was the most popular and prestigious device to own in the emerging class of products known as…

Google Says Goodbye to Netscape Plugin API!

Google has announced that Chrome will end support for the Netscape Plug-in API architecture, starting with ending support for most plugins in January 2014. This…

Windows 8 & Comodo: Perfect Together

When considering upgrading to a new operating system your most important question is usually whether the applications you use will be compatible. Nothing is worse…

Oracle Updates Monitoring & Security Features for Java 7

With widespread security concerns over Java vulnerabilities, Oracle released an updated version titled Java 7 last Tuesday. The new standard edition version 7 update 40,…

Are Phishing Attacks REALLY Down?

There is a recent study by the “Anti Phishing Working Group” (APWG) being widely reported that phishing attacks were down 20% in 2012. When I…

Google, Yahoo and Facebook Ask the NSA for Transparency

With the issues related to NSA a hot topic, the top Internet companies Google, Yahoo and Facebook have now requested permission to publish the number…

10 Tips for a Less Risky Internet Experience

The Internet can be a dangerous place to operate.  It is increasingly looking like a bad neighborhood when the police are on strike.  Even without…

Page 58 of 69« First...102030...5657585960...Last »