Graduation is a great time to review your social media profile. Don't let a wild and crazy social network presence undermine the promise of graduation, your chances for a scholarship, job, internship or other career choices.
Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.
On the one year anniversary of Edward Snowden's public revelations of mass surveillance conducted by the U.S. National Security Agency we look back on the impact, even as we face the prospect of more revelations to come.
FBI names as "Most Wanted" the leader of cyber criminal gang based in Russia and Ukraine responsible for both GameOver Zeus and Cryptolocker schemes, as law enforcement agencies crack down on cyber crime infrastructure.
As the 145 million people affected by the security breach at online giant eBay get used to the idea that their personal information may be "out there" and their passwords need to be changed, we wanted to update yesterday's coverage of the story.
The never-ending Windows support scam often misrepresents obsolete MS-DOS utilities. But three simple rules will bypass most of that social engineering.
Google, Facebook, Twitter and AOL have joined forces to stamp out fake tech support services where customers are fooled into calling bogus technical support lines, where they are encouraged, not to fix their comptuer, but to install malware - or give away details crucial for identity theft.
There has been a lot of talk in the news lately of a new ransomware for Android. While this does sound dire, and the possibility exists for more problematic threats on Androids in the future, it is not yet time to panic.
Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.
Can't yet upgrade from XP? Recommendations are being made by Gartner and others for staying (relatively) safe.
When parents post photographs and information about their children to social media, what are the privacy implications for those children when they're grown? What happens on the internet tends to stay on the internet, and not necessarily in a good way.
This patch Tuesday, April 8, 2014, sees the last updates to be released to the public for Windows XP and Office 2003. After today, these programs have reached their End of Life (EOL) status, and will no longer be supported by Microsoft
Dynamic or on-access Mac testing of AV products is problematical with samples for which Apple has implemented signature detection.
As Mac malware increases in prevalence, testing security software that supplements OS X internal security gets more important and more difficult.
Recently it was announced that Satya Nadella will be Steve Ballmer’s successor as CEO of Microsoft. Of course for the cybercriminals this is the time to dust off and polish the good old Microsoft Lottery scam and update it.
If someone rings you up to tell you that your bank card has been compromised, it may be because they want to get their own hands on it.
Yet another innovative tech support scam, using Netflix phishing to get remote access to the victim's system.
Networking giant Cisco has launched a “grand challenge” to invent a security solution for the “internet of things” - a broad term used to describe connected devices from industrial equipment to cars to smart home appliances.
It's not just fake tech support: call centre cold-callers are operating various kinds of insurance scams, too.
A roundup of scam information, including a tax scams article, email with a link to malware, a phish, and the worlds laziest 419.