Losing your smartphone can result in a catastrophic security breach. After all, these devices are potential treasure troves of confidential corporate and personal information waiting to be exploited by anyone who comes across them. Because of this a mobile device security industry has sprung up over the last few years, offering everything from simple data […]
A few hundred expert hackers offering “crime as a service” are behind a large percentage of all the cybercrime acts committed. That’s the conclusion of a group of international law enforcement experts from organizations including the FBI and the UK’s National Crime Agency. Talking at the recent InfoSec Europe security conference in London, FBI agent […]
For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source technology, to protect U.S. government communications. It is used by people living under restrictive regimes who want to access forbidden information or […]
Apple Pay was launched on Oct. 20 and, thanks to all the media excitement, you could be forgiven for thinking that it was the first mobile payment system to be introduced to the world. In fact there are plenty of others, most notably Google Wallet and Softcard. Another system, called CurrentC, is being developed […]
When the TrueCrypt encryption software project was abandoned two years ago, it left many folks looking for an open source encryption system. VeraCrypt appeared on the scene as a TrueCrypt alternative. VeraCrypt is a fork of the original TrueCrypt code, and the project is run and managed almost single handedly by French IT security consultant […]
Recent corporate security breaches have taught us something important: The average computer user is spectacularly bad at choosing good passwords. The most popular passwords turn out to be simple, easy-to-remember ones, like “password,” “123456,” “monkey” and “iloveyou,” all of which provide little security. If you can remember your password, then it is probably not secure. […]
Digital certificates play a vital security role on the Internet. They allow you to prove that your websites are genuine, sign applications and software updates to prove that they originated from you, and communicate with customers easily using encryption. The drawback to certificates is that if anything goes wrong, the potential fallout can be disastrous. […]
The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched. So it’s important to be aware of the threats to enterprise security that are coming over the horizon and heading this way. It’s a question the Georgia Institute of Technology addresses […]
When hackers broke in to the New York Times’ network, evaded its anti-virus software and began plundering its computer systems, it highlighted a rather uncomfortable truth: ?Anti-virus software is not that good at keeping systems secure. That means that any company that relies on an anti-virus package to secure its endpoints is exposing itself to […]
Why are hackers able to breach the security of so many organizations using known vulnerabilities, and what can you do minimize the risk that this happens to you? It’s an important question to ask, because consequences can be significant if a security breach leads to the theft of confidential proprietary data or loss of customer […]
Subscribe to Cybersecurity Insider for top news, trends & analysis