Phishers Spoof Bank’s Security Guidance Web Page

Contributor: Sandeep Ingale
When it comes to financial organizations, being informed about best security practices is every customer’s right. Many organizations provide this information on their websites to help their customers learn how to take …

5 Signs You Are About to be Scammed

      No Comments on 5 Signs You Are About to be Scammed

Smart people are scammed every day because they think it can’t happen to them or they just aren’t aware of the scams. And the scammers have gotten very good at disguising their scams, so it’s often hard to recognize them. Scamming generally involves a form of social engineering. Social engineering is the act of manipulating Read more…

2013 ISTR Shows Changing Cybercriminal Tactics

The Symantec Internet Security Threat Report (ISTR) 2013 reveals how the threat landscape is evolving, compiling information from more than 69 million attack sensors in 157 countries around the world. This year’s report shows more targeted attack…

Four Types of Parents

      No Comments on Four Types of Parents

When Online Safety Expert Taylor Tompkins and I speak with parents about how to keep their kids safe online we encounter these four types of parents.  Which one are you? Type 1:  Hopeless hapless OMFG we are doomed!!!!! Defining traits: Overrun, intimidated “My kid has found out how to stream illegal movies from our home Read more…

WordPress sites hacked

      No Comments on WordPress sites hacked

There is a nasty botnet trolling WordPress sites trying to log in with the default admin user name and using “brute-force” methods to crack the passwords. Our advice to save your wordpress blog from being hacked is to change admin as the login name to something else and use strong passwords. Matt Mullenweg, the founder […]

PCI Compliance – The Value of Getting Your Business Certified

If you operate an online business that accepts credit or debit cards, then you are probably familiar with the Payment Card Industry Data Security Standards (PCI DSS). We’ve discussed the benefits of PCI Compliance before, and it is crucial to ensure that your business becomes and remains in compliance with these requirements. As more and Read more…

Avast and Android Police host International Mega Giveaway

You could win 1 of 9 Nexus devices! All you have to do is visit the Android Police contest page and answer this question: What feature (or features) would you like to see added to avast! Mobile Security? Visit the Android Police contest page now, read through the description of the contest, and add your […]

How to Securely Dispose of Your Old Smartphone

How many of us have simply restored a phone to its factory settings before recycling it or selling it on Craigslist? What if I told you that there could still be data left behind? This week, a mobile forensics team released the results of an experiment meant to discover what kind of data lurks on Read more…

Why we love specifications (not)! Part II

Dealing with file formats is not really enjoyed by us. Usually the format designers haven’t had the security and parsing by foreign applications in mind, sometimes the specifications are hard to get, but, what is worst is the specification which claims something and then the major implementation does not follow it, allowing the bad guys […]

Trouble, Trouble, Trouble – The App Your Kids are Using Now: Ask.fm

It’s a familiar story. 7th grader has a birthday party, can only invite 5 friends, pictures of said birthday party are posted on Instagram, the next thing you know, anyone not invited to the party is upset, parents are calling, asking why their child wasn’t invited, groups are formed at school, each one taking a Read more…