infosec2 (1)

As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released...
tanks

People rely on the Internet today for so much more than they did even five years ago. Whether it’s social media, mobile applications, online banking, shopping, or just renewing yo...
blog mobile browser

We’re increasingly conducting our online lives through our mobile devices, be they smartphones or tablets, and while that’s a good thing for convenience, it comes with a price. Mo...
gmail_blog

Is Google’s wildly popular Gmail email service safe for work? The short answer is yes, for most of us at least, but there are circumstances in which Gmail is not an appropriate wo...
botnet

Botnets first came into the consciousness of most of the general public in early 2000 when a Canadian teenager launched a series of distributed denial-of-service attacks against s...
PURE 3.0

Organized cybercriminals have become adept at accessing consumers’ online bank accounts, exploiting either vulnerabilities in the Web-based application you access from your home c...
dow jones

The Dow Jones Industrial Average fell precipitously Tuesday after a group of pro-Syrian hackers took control of an Associated Press Twitter account and tweeted that U.S. President...
pdf_blog

Adobe’s suite of software offerings is one of the most popular programs in the world — which is precisely why it is also one of the most targeted and exploited platforms as well. ...