Phishing is most effective when it exploits human emotions—fear, greed, anxiousness, curiosity, compassion, getting a good deal
Browsing: Data Privacy
Even though most banks offer specialized apps for online banking, most smartphone apps are not protected as well as their website counterparts.
Retailers that use technology to try to save shoppers time and money without asking permission first may actually do more harm than help to their bottom line this holiday season.
Tripwire, Inc., announced the results of research on risk-based security management in the healthcare and pharmaceutical industries.
The security industry is a bit like an episode of Star Trek in that it’s pretty formulaic. A bad guy appears and cuts through the defenses,
We will need folks who can recognize new information security and privacy risks, there is no textbook to look to as risks evolve.
One such example is to take a straw poll to understand the number of IP connected devices those in the audience have at home, for the record the most anyone has ever answered is 71 (you know who you are!).
After 9-11, privacy got shafted in the rush to build tougher security, but we’ve seen how that has led to governments abusing authority.
The CSA continues to build its agenda for the upcoming Cloud Security Alliance Congress, adding a number of notable and heavily debated presentations
McAfee released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season