Mobile

How to Erase Your iOS Device

Security shouldn't stop at your computer. Your mobile phones and devices are actually more vulnerable to become lost or stolen, and they can contain just as much personal an...

How to: Protect Yourself at Public Wi-Fi Hotspots

There are, of course, privacy and security risks involved in using Wi-Fi on public wireless networks, such as the hotspots found in many airports or cafes. While the conveni...

The Caffe Latte Attack: How It Works — and How to Block It

The flaws that make WEP vulnerable were documented back in 2001, prompting development of dozens of cracking tools. Until recently, those attacks focused on traffic captured from active networks...

Email Administrator Best Practices

With last week’s release of a new set of “Best Common Practices”(BCP), the gurus of the anti-spam and anti-phishing world have given everybody who runs email systems a handy list of chores, just in ...

Latest articles