These days, as online shopping continues to rise and rise in popularity, people hand over the credit card info to a huge range of websites. Granted, security for e-commerce and online payment has also gotten better, but that doesn’t mean there aren’t s…
With thousands of IT security vulnerabilities discovered every year, promptly installing the patches released by software vendors is critical. Yet despite this, 60% of data breaches occur where a patch was available but not applied.
In France, the emergency phone number for female victims of domestic violence, was dialed 9,906 times in April 2020 — compared to 5,098 times in the same month last year. In addition, calls from relatives and neighbors to the police to report a situati…
Many species evolve in parallel, each seeking a competitive edge over the other. As cybersecurity and technology have evolved, so have criminals and ‘bad actors’ who seek to exploit weaknesses in the system for personal gain – or just to prove a point….
One of the most important parts of the holidays is the traditions we have. This is where we put the tree. This is what we eat at Thanksgiving dinner. This is who cooks which dish. This is where we place the menorah. This year, many of us are choosing n…
One of the most important parts of the holidays is the traditions we have. This is where we put the tree. This is what we eat at Thanksgiving dinner. This is who cooks which dish. This is where we place the menorah. This year, many of us are choosing n…
Instagram is tracking basically everything you do. Seriously — their privacy policy, such as it is, might be one of the broadest I’ve ever seen. For example, if you use their in-app camera, they reserve the right to analyze what’s in the image and ther…
CEO Jack Dorsey has tapped Peiter Zatko, otherwise known as famed white-hat hacker “Mudge,” as the new head of security at Twitter. Zatko is undergoing a review period for 45-60 days before assuming full control of the platform’s security, which encomp…
If you’re looking to boost your career in application security, there is no better place to start than by reading a copy of Tanya Janca’s new book, Alice and Bob Learn Application Security.
This week at Avast, we made the highly anticipated release official: Avast Secure Browser is now available for iPhone, iPad, and iPod! And while going through the development process, one question was constantly on our mind: “What does maximum privacy …