Eric Geier Avatar
  • 5 Ways to Make Your Browser More Secure

    While installing antivirus software is a good start to safe Internet browsing, it’s only a start. There is much more you can do to help protect yourself when browsing the Web than merely installing antivirus. Here I’ll share a couple ways. In this article you’ll discover extra security features in Firefox and Chrome, sandboxing to […]

  • How to Secure DNS with DNSCrypt & DNSSEC

    Like most of the network protocols and systems in widespread use today, the Domain Name System (DNS) harbors significant security vulnerabilities. Though DNS provides a deceptively simple service — translating human-friendly website addresses such as http://www.cnn.com into computer-friendly numerical IP addresses such as http://157.166.255.19 — the system’s integrity is a crucial cornerstone of Internet operations […]

  • How to Secure Your Facebook Business Page

    Do you manage a Facebook Page for your business or organization? If so, you’re probably aware that many of the same security issues that plague personal profiles also apply to Pages. But what you may not know is that there are several additional security issues that you should be thinking about when managing a Facebook […]

  • Hiring Hackers and Buying Malware is Easy

    In the earlier days of computers, virus writers and hackers were viewed as fame-seeking and adrenaline-hungry teens with nothing better to do. But as PC usage and the Internet grew, the amount of potential victims grew exponentially and money became the hacker’s greatest motivator; spawning a whole new cyber-lexicon that now includes the term criminal. […]

  • Is Your Free AV a System Hog?

      The effectiveness of malware detection, how well it catches infections, is the chief characteristic to consider when choosing an antivirus program. But resource consumption, how much system resources it uses, is also important. This is especially true on older machines where heavy duty usage by your AV software can bog down the system and […]

  • 8 iOS Security Apps for Jailbroken Devices

    Due to the iOS design, there are a limited number of security apps in the Mac App Store. However, jailbreaking your iPhone, iPad, or iPod Touch gives apps more control of iOS and the device. Thus you’ll find more security apps in Cydia and other repositories. The security and stability risks are debatable, but with […]

  • Tools to Deploy 802.1X on Mobile Devices

    Deploying WPA2-Enterprise security with 802.1X authentication across your Wi-Fi network of PCs is already quite a task. Adding in support of all the mobile phones and tablets makes it even more daunting. However, there are several solutions out there to help end-users configure their own devices, which can help cut down calls to the IT […]

  • Review: SUPERAntiSpyware 5

    SUPERAntiSpyware recently released version 5 of their antispyware and malware protection program, which they call their most significant update ever. In this review, we’ll take a look at the updates in regards to both the free and premium editions of SUPERAntiSpyware 5. We’ll see if it’s worth your time and money to use the free […]

  • Intro to Next Generation Firewalls

    The traditional stateful firewall filters traffic based upon ports and protocols. For example, blocking or allowing the entire port 80 for HTTP traffic or port 443 for HTTPS traffic. It’s an “all-or-nothing” approach. Newer firewall technology can also filter traffic based upon the applications or traffic types traversing these ports. For example, you could open […]

  • More Tips on Removing Viruses and Malware

      The first thing to do is determine the validity of any antivirus alerts. A popular malware technique is to display alerts saying a computer is infected in hopes of the user downloading more malware and/or paying for fake antivirus protection.These programs are often called scareware or Trojan horses. If you receive any antivirus alerts, […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis