rental

Safe Vacation Rentals

The Internet has made planning and booking a vacation easier than ever before. But beware, there are lots of scammers who are ready to pounce on unsuspecting victims booking their...
services

Who’s Using Encryption? Who’s Not?

Strongly encrypted communications are secure and private communications (as long as there is no monkey-business going on in the way the encryption is implemented into communicatio...
internetofthings

Securing the Internet of Things

In late 2011, it emerged that Chinese hackers had thoroughly compromised the United States Chamber of Commerce, perforating the lobbying-group’s networks with a devastating chain ...
rootkit

How to Fight Rootkits

Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself ...
twitter_title

Avoiding Scams and Trolls on Twitter

Not long ago, Twitter was a novelty social media site that average users thought was silly. Now the microblogging tool is a vital news source and publishing platform, letting anyo...