Can I Guess Your Password?

We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. It is extremely important to make sure this program is updated at least once a week, and all drives are scanned. Viruses usually are used to destroy your... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Does she give it back, or does she explore... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. The work undercover to check on your surfing patterns, spending habits, items bought, they extract email addresses, hijack browsers, steal credit card information. These are just some of the things a... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. I'm now even more paranoid after I joined YMMSS because I use online payment systems on weekly basis if not daily.I used to use Microsoft Excel to manage my... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Okay, so here I was, opening Google, entering the name of the eBook - clicking... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it must be your worst nightmare--to wake up and learn that you are a bankrupt. Some crook stole your personal data and all the money you have been sweating blood for years has flown to somebody else's account. Almost everybody must... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer. Mine was getting old, had lost its whistle, and the few remaining bells didn't ding a nicely as they had in the past. Yep, it was time for a new state-of-the art dream machine with CD burner. DVD player, a... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the... Read More

In The News:


Social Security, Retirement Are Saved And Expanded! (April Fool's Day Edition)
To bolster the system, Congress made the Social Security tax progressive by lifting the earnings cap of $113,700. Now any wages above that amount would be subject to the Social Security tax. The proceeds would go into a “lockbox” account that Congress ...
Social Security: Should You Wait Until Age 70 to Collect?Huffington Post
Insight: Social Security – Spring into a stress-free
When Should You Begin Collecting Social Security?NerdWallet (blog)
The National Law Review -Shelton Herald
all 14 news articles »

Digital Trends

An ADT exec went rogue and created Abode, a contract-free security system
Digital Trends
Within the next five years, 60 percent of U.S. homes will have a smart security system, according to a recent survey. That's second to only connected thermostats, which will be found in 70 percent of homes. Lots of companies want to carve themselves a ...

NBC Bay Area

San Jose: Latest airport fence breach renews focus on persistent problem
San Jose Mercury News
SAN JOSE -- Nearly a year after a high-profile security breach at Mineta San Jose International Airport, little seems to have been done to bolster what has proven to be a repeatedly exposed vulnerability: 6 miles of perimeter fence that doesn't do its ...
Woman Arrested After Security Breach at Mineta San Jose International Airport ...NBC Bay Area
Another breach at Mineta San Jose International Airport reignites security
San Jose police identify suspect in airport security breachKTVU San Francisco
SFGate -SecurityInfoWatch
all 98 news articles »


Google Bans China's Website Certificate Authority After Security Breach
Google has announced that its web browser Chrome and other products will no longer recognize security certificates issued by the China Internet Network Information Center (CNNIC), the government agency that oversees China's domain name registry.
Google drops support for Chinese internet security certificates after trust breachSouth China Morning Post (subscription)
Google to drop China's CNNIC Root Certificate Authority after trust breachThe Next Web

all 27 news articles »


China Expands Social-Security Fund Investments to Local-Government Debt
Wall Street Journal
BEIJING—China's State Council, or cabinet, announced measures on Wednesday to boost returns at the nation's social-security fund, expanding its investment scope to include local-government bonds and other financial instruments. The new rules allow the ...
China Expands Social Security Fund Investments to Local Government Debt ...Nasdaq
China broadens investment scope for social security fundXinhua
China expands investment scope of $194 bln social security fundReuters
China Economic Review
all 24 news articles »


New Cadillac with nifty security feature unveiled
They're also attached to security sensors so if the car is moved or any window glass is broken, which would set off the alarm, a series of photos is taken all around the car. The images are stored within the car and can be accessed later using a memory ...

and more »

Fox News

Homeland Security Head Threatens to Defy Subpoenas
The Weekly Standard (blog)
Citing a lack of cooperation from the Secret Service, Chairman Jason Chaffetz of the House Committee on Oversight and Government Reform issued subpoenas for two Secret Service agents to testify to the committee about recent security breaches and other ...
US House committee subpoenas two Secret Service agents over security incidentReuters

all 152 news articles »


Thailand ditches martial law, replaces it with sweeping new security order
Human Rights Watch said in a statement that the new security order would allow Prayuth "to issue orders without administrative, legislative, or judicial oversight or accountability." "Thailand's friends abroad should not be fooled by this obvious ...
The Thai Junta Has Replaced Martial Law With an Equally Draconian Security ...TIME
Martial law replaced in Thailand by security orderTribune-Review
Thailand lifts martial law; replaces with sweeping security

all 489 news articles »


The easy Java and Flash security fix everyone hates to do
Quickly patching vulnerable software is key to keeping computer systems secure. Yet, consumers are increasingly leaving their systems open to attack by failing to patch two ubiquitous third-party programs: Oracle's Java and Adobe's Flash. Over the past ...


Dept. of Elections: 'serious security concerns' with wireless voting machines
VIRGINIA (WAVY) — A Virginia Department of Elections (DOE) report cites “serious security concerns” with certain voting equipment used during the November 2014 General Election. On Wednesday, the DOE released it's “Interim Report on Voting ...
Dept. of Elections identifies serious security concerns with some voting

all 2 news articles »
Google News
Showing 1 - 10 of 237 Articles
« Previous
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Next »

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Top 10 tips for Safe Internet Shopping

Over 5 billion pounds was spent on online shopping in... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More