Is it better to use the Windows XP SP2 firewall and turn off ZoneAlarm or the other way around?
The articles in this category cover identity theft, hacking, viruses, spam, malware, and wireless security, along with tools, tips, and technologies to lower your exposure to them.
The demand for content puts more pressure on website administrators, who may resort to stealing content in order to fill space on their sites
CNET’s security blogger Michael Horowitz described extensively in a recent blog entry why it is so important to upgrade right away your browsers on Macs, Linux and Windows to Flash Player’s version 18.104.22.168.
Ignorance and a simple four-word Google search query allowed individual to take control of thousands of ATMs across the US.
Any web project with custom-programming (i.e. e-commerce) should follow these from the outset, or you’ll regret it later.
Antivirus vendor cries foul, saying Microsoft locks out other vendors’ products.
Apple’s Mac OS X not as safe as previously thought?
Can corporate IT infrastructure be secured at a reasonable ROI?
Just erasing entries on your cell phone is not enough. There’s more to it.
Great set of resources to protect your customers’ security & privacy
Comprehensive set of strategies to avoid becoming a victim of identity theft and fraud.
Is your company leaking customer’s privacy? Find out how to minimize your exposure.
Discussion on how to safeguard customer-sensitive information on corporate laptops.
SSL is used in ecommerce transactions to protect online submission of sensitive customer information.
Don’t be like most people in a recent survey – universally protected by a single, crackable password.
Unearthing electronic crime fighting trends and techniques, including best practices and emerging trends.
Implementing a security strategy can be daunting for small businesses. Find out how to go about it.
Fantastic checklist with tips for ironclad wireless security – not only for regular wireless users.
Evaluate the security of your wireless network and everything it is connected to.
The lowdown on WEP and WPA, and why you should choose to protect your network with WPA.