Mobile banking apps must be made more secure
How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting...
View ArticleWeb browsers remain gateways for malware
Web browsers became widely used from the mid 1990s onward, following the early success of Netscape Navigator and the subsequent rise of Microsoft Internet Explorer as the default option on millions of...
View ArticleTax season security threats: TorrentLocker
Tax season brings different meanings for different groups of people. For employers, this is the time of year when they need to ensure that tax information for their staff is in order and that they...
View ArticleCyber security: The cooperation game
Competition is perhaps the most important component of the business sphere. After all, it's through brand and company competition that the best products end up hitting the marketplace. If Business 1 is...
View ArticleWhat lies beneath: The deep web and future crimes
The Internet is like an iceberg: There's the part that's visible, and then there's the rest. When we use the Internet, we regard it as a vast, limitless expanse of data. And yet the Internet that we're...
View ArticleBYOD security: Dealing with targeted attacks and zombie apps on mobile
Mobile security continues to be a challenging frontier for enterprises, many of which have only recently adopted bring-your-own-device policies and are still in the process of overhauling their...
View ArticleHow to deal with fake websites
Fake websites have long been a thorn in the side of both consumers and enterprises. The problem has become significant enough for some desktop Web browser makers, including Google and Apple, to...
View ArticleCyber threat group and its new targeted attack campaign: Rocket Kitten and...
In recent years, a number of cyber criminal groups have emerged, using their combined skills and knowledge to inflict even more damage on their prospective targets than a single hacker would be able...
View ArticleKeeping Mobile Malware at Bay
There’s a lot of airtime devoted to all the different malicious threats that attack computers, but not as much attention is paid to mobile malware. That is starting to change, however, as mobile...
View ArticleConsumers concerned about privacy of data in the Internet of Everything
The Internet of Things – sometimes called the Internet of Everything – was over the horizon for a long time, but now it is finally coming into view as IP connectivity is extended to a large number and...
View Article