infosec2 (1)

Infosec 2013: A Review

As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released...
tanks

Ultimate Protection With PURE 3.0

People rely on the Internet today for so much more than they did even five years ago. Whether it’s social media, mobile applications, online banking, shopping, or just renewing yo...
blog mobile browser

Mobile Browser Security

We’re increasingly conducting our online lives through our mobile devices, be they smartphones or tablets, and while that’s a good thing for convenience, it comes with a price. Mo...
gmail_blog

Is Gmail Safe For Work? (It Can Be)

Is Google’s wildly popular Gmail email service safe for work? The short answer is yes, for most of us at least, but there are circumstances in which Gmail is not an appropriate wo...
botnet

What is a Botnet?

Botnets first came into the consciousness of most of the general public in early 2000 when a Canadian teenager launched a series of distributed denial-of-service attacks against s...
PURE 3.0

Safe Online Banking With PURE 3.0

Organized cybercriminals have become adept at accessing consumers’ online bank accounts, exploiting either vulnerabilities in the Web-based application you access from your home c...
dow jones

Reconsidering Twitter After AP Hack

The Dow Jones Industrial Average fell precipitously Tuesday after a group of pro-Syrian hackers took control of an Associated Press Twitter account and tweeted that U.S. President...
pdf_blog

Adobe PDFs and Security

Adobe’s suite of software offerings is one of the most popular programs in the world — which is precisely why it is also one of the most targeted and exploited platforms as well. ...