Universities Go to School on Computer Security

Cyber security at a university can be a very different challenge than in a corporate environment. With an ongoing wave of cyber attacks, it is…

Hackers Find Fatal Flaw of Fingerprint Security

When Apple announced the Touch ID technology that rolled out with the new iPhone 5, it sounded like science fiction. Your phone can now be…

anti-spam mobile application

RIP Blackberry?

Once upon a time, the Blackberry from RIM was the most popular and prestigious device to own in the emerging class of products known as…

Google Says Goodbye to Netscape Plugin API!

Google has announced that Chrome will end support for the Netscape Plug-in API architecture, starting with ending support for most plugins in January 2014. This…

Windows 8 & Comodo: Perfect Together

When considering upgrading to a new operating system your most important question is usually whether the applications you use will be compatible. Nothing is worse…

Oracle Updates Monitoring & Security Features for Java 7

With widespread security concerns over Java vulnerabilities, Oracle released an updated version titled Java 7 last Tuesday. The new standard edition version 7 update 40,…

Are Phishing Attacks REALLY Down?

There is a recent study by the “Anti Phishing Working Group” (APWG) being widely reported that phishing attacks were down 20% in 2012. When I…

Google, Yahoo and Facebook Ask the NSA for Transparency

With the issues related to NSA a hot topic, the top Internet companies Google, Yahoo and Facebook have now requested permission to publish the number…

10 Tips for a Less Risky Internet Experience

The Internet can be a dangerous place to operate.  It is increasingly looking like a bad neighborhood when the police are on strike.  Even without…

HP Pwn2Own 2013: Mobile Bugs Earn Big Bucks!

Mobile computing is on a spree and growing at a rapid pace. In order to create a more secure environment for mobile users, the Pwn2Own…

Page 61 of 72« First...102030...5960616263...70...Last »