security: End user/client security
Two-factor authentication is a good step. But for securing many sites, Twitter included, it's not enough.
Cybersecurity bill's backers portray threat intelligence sharing as a panacea, but yet again ignore the potential privacy and security downsides.
Passwords keep proliferating, but do new technologies and approaches offer an alternative? Maybe.
Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations.
Eccentric antivirus firm founder John McAfee says he tricked people with spyware -- using free laptops. Social engineering attacks remain cheap,...
But Facebook should be looking at why the notice went viral.
Lawmakers, now reminded of their own vulnerability, need to strengthen email privacy protections. Companies need to do more to help customers...
From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.
Apple, Amazon, and other vendors need to come up with better ways to safeguard accounts against social engineering attacks. But users must help.
What will it take for cloud service providers to overhaul their customer identification mechanisms and finally get serious about social...
Security Newsletter Sign Up
Get timely, actionable insights tailored to the topics you are interested in.Sign Up
May 23, 2013
Authentication measure comes in wake of Syrian Electronic Army account hacks, further security steps coming.
May 20, 2013
Color-coded password-strength meters nudge users to improve the strength of their important passwords, but have little effect on unimportant ones,...
May 20, 2013
Defense Department and Google pilot test seeks more secure ways to authenticate users on commercial cloud services.
May 17, 2013
Syrian hackers claim to battle American imperialism, media bias and Angelina Jolie.
May 13, 2013
Readers detail "frozen DNS Trojan" cold calls and "repairs" that lead to $882 in unauthorized wire transfers.
May 09, 2013
Satire site The Onion details multi-pronged Twitter account takeover strategies used by hacktivists.
May 07, 2013
To improve detection of database breaches, businesses should store multiple fake passwords and monitor attempts to use them, according to...
May 02, 2013
Twitter memo warns of ongoing account takeover attempts, urges media businesses to prepare. Should Twitter be doing more?
May 01, 2013
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.
May 01, 2013
LivingSocial.com is one of the latest in a long line of "big scores" by hackers.
- Secure your mobile applications in the new commerce era - Mobile Commerce World - Mobile Commerce World
- Learn how to move your broadband service to an All-IP network at TelcoVision (formerly TelcoTV) - TelcoVision
- Get practical information on how to develop your organization's mobile commerce application - Mobile Commerce World - Mobile Commerce World
- Get practical strategies to build a solid plan for profitability and success - Mobile Commerce World - Mobile Commerce World
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
- The Untapped Potential of Mobile Apps for Commercial Customers
- Get Actionable Insight with Security Intelligence for Mainframe Environments
- Serving Two Masters: The Secret to Successful Identity and Access Management Deployment
- Remove Administrator Rights Without Disrupting End User Productivity
- Outsourcing Security: What Every Potential Cloud Security Customer Should Know
This Week's Issue
Free Print SubscriptionSubscribe
Current Government Issue
- The Government CIO 25: These influential and accomplished government IT leaders are finding ways to be cost efficient and still innovate.
- Rethink Video Surveillance: It's not just about networked cameras anymore. New technology provides analytics, automation, facial recognition, real-time alerts and situational-awareness capabilities.
- Read the Current Issue