How to Have A Cyber-Safe Super Bowl: Top Cyber Security Threats to Watch Out For

Where Things Can Go Wrong The big game is here. Whether you’re going to the game or making your specialty deep fried corn dogs or chili cheese nachos, there are some cyber security concerns you should be aware of before you settle in for kickoff…. Continue reading How to Have A Cyber-Safe Super Bowl: Top Cyber Security Threats to Watch Out For

Data Privacy Day: Where has privacy gone, and will we ever get it back?

Privacy is gone, but never forgotten. Can our current path even be reversed? Yes, the end of privacy as we know it is closer than you may think.  Privacy definitions are very different between nation states and cultures, though one common thread i… Continue reading Data Privacy Day: Where has privacy gone, and will we ever get it back?

Why is least privilege the place to start for endpoint security?

Because it will save you time and money.   Your end user’s computers are increasingly exploited as an attack vector used to attain accounts with local administrator rights on Windows or root access on Mac OS. Th… Continue reading Why is least privilege the place to start for endpoint security?

Security Concerns around Remote Employees

In the cloud-based economy, businesses of every size are hiring remote employees. Remote employees may decrease their capital costs, free the business from location limitations, and provide many of the intangible benefits of remote working. The increas… Continue reading Security Concerns around Remote Employees

You Got a 3D Printer, Now What?

Given the incredibly low prices on some of the models currently on the market, it’s more than likely a number of Hackaday readers have come out of the holiday season with a shiny new desktop 3D printer. It’s even possible some of you have already made the realization that 3D printing is a bit harder than you imagined. Sure the newer generation of 3D printers make it easier than ever, but it’s still not the same “click and forget” experience of printing on paper, for instance.

In light of this, I thought it might be nice to start off the …read more

Continue reading You Got a 3D Printer, Now What?

18 Cyber Security Trends We Are Watching in 2018

We had an interesting year in 2017. If any trend is obvious, it’s that 2018 will continue to be interesting for the cybersec industry. How interesting? Here is are the 18 trends that we think will be making the headlines and should be on your rad… Continue reading 18 Cyber Security Trends We Are Watching in 2018

How to Create Secure Passwords For Your Website

Have you ever had to sign up for a new account, but once the time came to create a password, your spirits dropped a little? It’s hard enough to remember one password let alone multiple passwords. Panic sets in as the security suggestions prompt … Continue reading How to Create Secure Passwords For Your Website

Risks For E-commerce Site Owners Through the Holidays

Shopping season is here, and with that, so is the opportunity for ecommerce site owners to grow their revenue and reputation. However, hackers are also busy infecting ecommerce websites with malware, such as:

Credit Card Swipers
Malicious Payment Gat… Continue reading Risks For E-commerce Site Owners Through the Holidays

Android WebView: Secure Coding Practices

Nowadays, there is no doubt that mobile applications have changed the world in a big way. Just look at the […]

The post Android WebView: Secure Coding Practices appeared first on Checkmarx.

The post Android WebView: Secure Coding Practices appeared first on Security Boulevard.

Continue reading Android WebView: Secure Coding Practices

Top Cybersecurity Trends for the First Half of 2017

Many of the most notable cybersecurity trends of the first half of 2017, such as the rapid evolution of malware techniques, will continue through the year.

The post Top Cybersecurity Trends for the First Half of 2017 appeared first on Security Intelligence.

Continue reading Top Cybersecurity Trends for the First Half of 2017