There’s a lot to like about Google Chrome’s built-in security features. The browser offers unique sandboxing functions and privilege restrictions, and even updates itself in the background to help better protect you from hackers and malware. But like all browsers, Chrome is imperfect, and there are steps you can take to protect it from attack. Here’s how to... Read More
To The Unfakeable Digital Anarchist Currency Everyone’s Obsessed With
What is Bitcoin?
Bitcoin is a decentralized, anonymous, digital-only currency that’s lately gotten a lot of public attention.
But this isn’t some brand new invention — Bitcoin was originally developed in 2008.
In 2008, someone using the pseudonym “Satoshi Nakamoto” published a paper... Read More
Feedly is cleaning Google Reader’s plate.
The RSS feed reader app says it has picked more than 500,000 Google Reader users since Google announced it will be killing Reader on July 1.
The reason? Feedly has made it simple for Google users to... Read More
Leading privacy expert Caspar Bowden has warned Europeans using US cloud services that their data could be snooped on. In a report, he highlights how the Foreign Intelligence Surveillance Act Amendment Act (FISAAA) allows US authorities to spy on cloud data.
This includes services such as ... Read More
These days when I’m consulting with big businesses, governments, and other organizations, two main topics come up over and over: pass-the-hash attacks and hacktivism. One government client put it thusly: “Our department considers pass-the-hash attacks our No. 1 threat, above all other computer threats.” A lot of things are broken in... Read More
When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large part to the — at times gaping — shortcomings of traditional approaches to securing IT systems and data.... Read More
Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics.
Even if you never email sensitive information–social security numbers, banking info, business secrets, and so on–you should consider using encryption. Aside from... Read More
How vulnerable are most companies to hacking? So vulnerable that hackers claim they can point their systems at pretty much any target and be guaranteed of breaking in fairly quickly. Most run-of-the-mill vulnerability testers I know can break into a company in a few hours or less. It must be child’s play for professional criminals.... Read More
As small business owners focus more on keeping their digital information out of harm’s way, many can neglect to provide the same level of security for their physical assets — including company-owned cell phones, laptops, tablets and digital cameras.
The good news is that a growing... Read More
Computer users are being urged to uninstall the Flash Player plug-in by a group of US developers.
The Occupy Flash movement claims the software is buggy, crashes a lot and requires constant security updates.
Adobe recently cancelled development of its Flash plug-in for... Read More