Can I Guess Your Password?

We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. It is extremely important to make sure this program is updated at least once a week, and all drives are scanned. Viruses usually are used to destroy your... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Does she give it back, or does she explore... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. The work undercover to check on your surfing patterns, spending habits, items bought, they extract email addresses, hijack browsers, steal credit card information. These are just some of the things a... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. I'm now even more paranoid after I joined YMMSS because I use online payment systems on weekly basis if not daily.I used to use Microsoft Excel to manage my... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Okay, so here I was, opening Google, entering the name of the eBook - clicking... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it must be your worst nightmare--to wake up and learn that you are a bankrupt. Some crook stole your personal data and all the money you have been sweating blood for years has flown to somebody else's account. Almost everybody must... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer. Mine was getting old, had lost its whistle, and the few remaining bells didn't ding a nicely as they had in the past. Yep, it was time for a new state-of-the art dream machine with CD burner. DVD player, a... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the... Read More

In The News:


Reuters

Staples: 6-Month Breach, 1.16 Million Cards
Krebs on Security
Office supply chain Staples Inc. today finally acknowledged that a malware intrusion this year at some of its stores resulted in a credit card breach. The company now says some 119 stores were impacted between April and September 2014, and that as many ...
Staples says security breach may have affected 1.16 million cardsReuters
Staples: Customer Data Exposed In Security BreachCBS Local
Staples reports data security breach at 115 stores; 1 in ConnecticutFOX CT

all 359 news articles »

North Korea Refuses To Take Part In UN Security Council Meeting On Its Human ...
Huffington Post
UNITED NATIONS (AP) — An angry North Korea, now on the defensive over a U.S. accusation of hacking, is refusing to take part in a groundbreaking U.N. Security Council meeting Monday where the country's bleak human rights situation will be discussed ...

and more »

New York Times

Sony, Security and the End of Privacy
New York Times
Rotenberg was explaining a remarkable survey that had just been published by the Pew Research Center, which found that overwhelming majorities of Americans seriously questioned the confidentiality and security of their social-media activity, their ...


Al-Arabiya

Egypt: Security Forces Kill 5 Islamic Militants
ABC News
Egypt's Interior Ministry says security forces killed five militants from a Sinai-based group allied with Islamic State extremists during a raid in the country's north. The ministry says Sunday's raid targeted a farm in al-Sharqiya province where some ...
Egypt security forces kill five militantsAl-Arabiya

all 42 news articles »

Government hacks and security breaches skyrocket
CNN
Washington (CNN) -- The North Korean hack of Sony Pictures that unleashed proprietary information, leaked embarrassing emails and brought the multi-billion dollar company's operations to its knees was unprecedented. But cyber security and intelligence ...

and more »

Tech Times

Lawsuits say Sony Pictures should have expected security breach
CNN
(CNN) -- Former employees of Sony Pictures Entertainment have filed four lawsuits against the company following a massive security breach. The suits alleged Sony was negligent because it didn't prepare for a massive cyberattack despite warnings and ...
White House says Sony hack is a serious national security matterWashington Post
FBI: North Korea to Blame for Sony HackKrebs on Security
Security experts: FBI report light on evidence linking North Korea to Sony ...Christian Science Monitor
ABC News -Tech Times -Business Insurance
all 18,748 news articles »

Digital Trends

Decrypt This: OS security showdown
Digital Trends
Decrypt This is a security column by Chris Stobing. It is published every other Friday. 2014 has been a tumultuous year for personal security. Through the continuing revelations of NSA leaks, North Koreans shutting down Sony, and the big bad bug that ...


ABC News

Social Security Q&A: Which of My Ex's Record Can I Claim Divorced Spouse's ...
Forbes
Social Security may be your largest or one of your largest assets. How you manage it, by deciding which benefits to collect and when, can make an absolutely huge difference to your lifetime benefits. And those with the highest past covered earnings ...
Financially Empowering WomenABC News
Is Social Security Unfair to Women?Motley Fool

all 4 news articles »

Wall Street Journal

UPDATE 1-CNOOC's Nexen shuts Yemen facilities due to security threat
Reuters
(Adds Yemeni officials, background). Dec 21 (Reuters) - CNOOC Ltd's Nexen unit said on Sunday it was shutting operations at an oilfield and processing facility in Yemen, where the Islamist militant al Qaeda group is operating, due to a security threat.
Cnooc Unit Suspends Oil Production in Yemen Citing Security ThreatWall Street Journal
Nexen Shuts Yemen Facilities after Security ThreatThe Maritime Executive

all 15 news articles »

RT

Probe reveals major security flaws at Frankfurt Airport – report
RT
Undercover inspectors posing as passengers have managed to smuggle banned items through security at Frankfurt's air gates, revealing major security lapses at Germany's largest airport as part of an EU probe, German media reports. Posing as regular ...
Investigators uncover major security deficits at Frankfurt AirportDeutsche Welle
Passengers security checks are done at a German airport. (File photo)\Press TV
Security gaps found at Germany's biggest airport: reportDaily Times

all 19 news articles »
Google News
Showing 1 - 10 of 237 Articles
« Previous
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Next »

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More