Contributor: Sandeep Ingale
When it comes to financial organizations, being informed about best security practices is every customer’s right. Many organizations provide this information on their websites to help their customers learn how to take …
Smart people are scammed every day because they think it can’t happen to them or they just aren’t aware of the scams. And the scammers have gotten very good at disguising their scams, so it’s often hard to recognize them. Scamming generally involves a form of social engineering. Social engineering is the act of manipulating Read more…
The Symantec Internet Security Threat Report (ISTR) 2013 reveals how the threat landscape is evolving, compiling information from more than 69 million attack sensors in 157 countries around the world. This year’s report shows more targeted attack…
When Online Safety Expert Taylor Tompkins and I speak with parents about how to keep their kids safe online we encounter these four types of parents. Which one are you? Type 1: Hopeless hapless OMFG we are doomed!!!!! Defining traits: Overrun, intimidated “My kid has found out how to stream illegal movies from our home Read more…
There is a nasty botnet trolling WordPress sites trying to log in with the default admin user name and using “brute-force” methods to crack the passwords. Our advice to save your wordpress blog from being hacked is to change admin as the login name to something else and use strong passwords. Matt Mullenweg, the founder […]
If you operate an online business that accepts credit or debit cards, then you are probably familiar with the Payment Card Industry Data Security Standards (PCI DSS). We’ve discussed the benefits of PCI Compliance before, and it is crucial to ensure that your business becomes and remains in compliance with these requirements. As more and Read more…
You could win 1 of 9 Nexus devices! All you have to do is visit the Android Police contest page and answer this question: What feature (or features) would you like to see added to avast! Mobile Security? Visit the Android Police contest page now, read through the description of the contest, and add your […]
How many of us have simply restored a phone to its factory settings before recycling it or selling it on Craigslist? What if I told you that there could still be data left behind? This week, a mobile forensics team released the results of an experiment meant to discover what kind of data lurks on Read more…
Dealing with file formats is not really enjoyed by us. Usually the format designers haven’t had the security and parsing by foreign applications in mind, sometimes the specifications are hard to get, but, what is worst is the specification which claims something and then the major implementation does not follow it, allowing the bad guys […]
It’s a familiar story. 7th grader has a birthday party, can only invite 5 friends, pictures of said birthday party are posted on Instagram, the next thing you know, anyone not invited to the party is upset, parents are calling, asking why their child wasn’t invited, groups are formed at school, each one taking a Read more…