Suzan Mustafa explains what two-factor authentication is, how it works, and how it can protect you against many nasty cyber-attacks.
Browsing: Hacking
The media is buzzing with the story of the CyberVor attack. But several experts, including ESET’s, wonder whether the news wasn’t just a publicity stunt.
Toopher CEO Josh Alexander identifies the volatile situation the CyberVor attack has created and how hackers can exploit this confusion and fear.
BullGuard Internet Security suggests some tips for how you can protect you and your business against phishing attacks.
Half of consumers would never use mobile commerce apps due to fears about the level of security on their devices, according to a consumer survey.
Mobile malware is increasingly the preferred method of attack for fraudsters, which raises the likelihood of a major mobile banking attack in the U.S.
A group of security experts in the information security industry comment on the recent CyberVor attack.
Professor John Walker proposes that we should utilize the element of imagination to think as would a cyber criminal to locate security unknowns.
Bob’s Business notes how most mobile devices today are insecure and suggests what you can do to protect you and your business’ mobile information.
Jaime Blasco, Director of AlienVault Labs, has discovered that Microsoft’s Internet Explorer browser is being exploited by hackers and cyber criminals.