A secure browser
For most of us, our web browser is the internet. It’s how we directly access the information and content online, for work, for fun, for research, for finance, for communication and almost everything else we do online.
This spring marked the 20th anniversary of the Melissa email virus, which spread around the globe, setting the stage for social engineering to become what it is today.
This spring marked the 20th anniversary of the Melissa email virus, which spread around the globe, setting the stage for social engineering to become what it is today.
Video gaming is now the world’s largest entertainment industry – bigger than music, even bigger than Hollywood. That means, for game developers and publishers, it’s also the most profitable place to be.
Our smartphones. Where would we be without them?
In December 2018, Chinese nationals Zhu Hua and Zhang Shilong were indicted by the US Department of Justice for involvement with the APT10 hacking group. The APT epithet stands for Advanced Persistent Threat. It is used to specify an elite hacking grou…
The need for greater oversight and accountability in our rapidly expanding digital world has acquired a relatively new angle thanks to globalization and geopolitics. In the rush to create market efficiencies, we usually don’t know or care where our oil…
Android users – and I’m one – are well-advised to be constantly vigilant about the types of cyberthreats directed, at any given time, at the world’s most popular mobile device operating system.
Smart technology and the internet of things (we’ll call it IoT for business, and smart devices for the home) is developing fast, often with little or no built-in security. At home, seduced by the attraction of new technology, we buy and use these smart…
What does “social engineering” mean?
The term “social engineering” may sound arcane and intimidating, and in some ways, it is. But most of us have encountered some form of social engineering many times — on the internet, in our emails, and in newspape…