Recent Posts

2-Step Verification and the Perils of a Poor User Experience (on Google)

MinterDial
How important is your privacy? It’s important, right? And, if you were asked about the importance of your security, you would inevitably also put a high value on your protection, right?
2-Step Verification and the Perils of a Poor User Experience (on Google)

The Fine Line Between Data Analytics and Security

Robin Carey
The more you know about your customers, the better you can serve and give them the products they want. In return, the more they trust and become loyal to your brand. But with all the information you gather from your customers to provide one-to-one service and personalized products comes the responsibility to take care of their personal data.
The Fine Line Between Data Analytics and Security

Google Says Collecting Data from Unencrypted WiFi Networks Isn’t Illegal

Janice Legnitto
Do you think it’s legal to collect data transmitted over unencrypted WiFi networks? Google does. This month, Google asked the U.S. Supreme Court to review an earlier federal appeals court decision that could make it liable for hijacking data from unencrypted WiFi networks in neighborhoods that were part of its Street View program.
Google Says Collecting Data from Unencrypted WiFi Networks Isn’t Illegal

The Epic Fail Most Companies Make and How Social Business Can Help

AntZets
It seems an insane irony that amid the more than $60 billion dollars we spend annually around the world on information security, we routinely fail to secure some of the most mission-critical information from a totally obvious risk. The problem may be old, but there is a new solution.
The Epic Fail Most Companies Make and How Social Business Can Help

76 Percent Say Free WiFi Can Lead to Identity Theft [INFOGRAPHIC]

Elaine Rigoli
They're so popular, those ubiquitous mobile devices. For better or worse, we've evolved into a society that is a texting, online-banking, TMI-ing, forever-connected, 24/7-kind of world. But have you ever considered the negatives when you're doing all that in a public wireless hotspot?
76 Percent Say Free WiFi Can Lead to Identity Theft [INFOGRAPHIC]

How to Keep Your Internet Usage Private [INFOGRAPHIC]

Socialbarrel
It has never been top-secret that online activity is far from being private. Chat, email, photos, videos, file transfers, social networking data: they may be accessed through the click of a button, at any given time or place. Here are a few methods for keeping your private data away from Internet companies, and even the public.
How to Keep Your Internet Usage Private [INFOGRAPHIC]

The Death of the Password

mrisher
Using no more processing power than what’s found inside a basic smartphone, it is now possible to generate all possible 8-letter passwords in a few hours. It’s shocking how many companies still rely on nothing more than username and password to secure sensitive data.
The Death of the Password

The Asocial Network: How Hackers Use Social Networks to Destroy Your Online Life

mrisher
How well do you know your social network? With the way our online identities are increasingly linked, all it takes is one less-than-discriminating friend in your circle for a hacker to gain access to and destroy your online life.
The Asocial Network: How Hackers Use Social Networks to Destroy Your Online Life

Are You Accidentally Sharing Your Secrets Online?

RohitBhargava

Eight Steps to Responsible Surfing

Spywarebusiness