Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




As technology continues to play an ever larger role in our lives, these threats can leave users feeling exposed.

The 5 Scariest Threats In Tech


You don't want others getting their hands on your sensitive data, but at the same time, you don't want to spend the money to get your data...

Destroying Data DIY


Rowhammer is a memory problem that could be exploited via the Web. Learn about what it is and what's being done to counter it.

Should You Worry About Rowhammer?


Your online activities could open you up to a world of trouble, like hackers, identity thieves and malware. Here are some tips for keeping...

6 Free Ways to Take Control of Your Internet Privacy


Numerous techniques can allow hackers access to your web apps, but what are the biggest risks? According to the Open Web Application...

A Look at the OWASP Top 10 Project: Protecting Your Web Apps


While we welcome the latest technological advances into our lives, they may be providing our private information to others. What should we...

Beware! Your Devices Are Spying On You


All hard drives will eventually fail. Its what businesses do to ensure they recover their data that matters. Here we look at the key causes...

Why Data Loss Happens - and What to Do About It


Sixty percent of computer users believe their data is worth about $1,000. Shouldn't you be backing yours up? We show you how.

Data Backup: Can You Afford Not To?


As technology innovations surge ahead, some apps are falling short on the security side of things. Read about this and more in this week's...

Web Roundup: Is Technology Costing You More Than You Realize?


Passwords can be stolen, and multi-factor authentication can be cumbersome, so what's a good security option? Big-data-based authentication...

How Big Data Can Secure User Authentication


Threats are constantly evolving, and so must your security. Here we take a look at some of the most important aspects of modern...

Making Networks More Secure in the Age of Cybersecurity


If you're running virtual machines, you may be vulnerable to hyper jumping attacks. But there are precautions you can take to lessen your...

Virtualization Security: Tips to Prevent VM Hyper Jumping


Protecting your personal computer isn't that difficult, right? Well, protecting all of the machines in your enterprise can be nearly as...

5 Easy Ways to Keep Your Business Secure Online


This infographic provides a deeper look into how police are using computers to solve crimes.

INFOGRAPHIC: 4 Major Criminals Caught by Computer Technology


Spam may be little more than annoying email. Then again, it might just steal your identity or drain your bank account.

Email Spam: What Goes Around Comes Around?


When it comes to mobile technology, there's a delicate balance between staying on the cutting edge and maintaining security. With this...

Web Roundup: Smartphones, Hackers and Cutting-Edge Mobile Technology


Videos can be priceless tools in your business, but if you don't protect them properly, they can also reveal priceless company secrets to...

Your Video Tech Could Be Putting Your Company at Risk


Digital IP can make or break a company, and its theft and misuse can be disastrous. Here we examine some low-tech ways to keep your IP out...

10 Low-Tech Ways to Protect Digital IP


The battlefield no longer has to be a physical space - war is now taking place in cyberspace. White hat and grey hat hackers combat...