Blog

Posted on April 9, 2014 by David Jevans in Blog The Best Information Security Resources on Google Plus Lately, we've been unraveling the top security resources to follow — including the best security experts on Twitter and the best security blogs to read — as it's helpful to discover experts on mul...
Posted on March 24, 2014 by David Jevans in Blog 12 Must-Have iPhone Security Apps to Protect Your Data For the first time in history, people spent more time on their mobile phones than on desktop computers in 2013. As a result, the necessity for phone security is increasingly important. A compromised d...
Posted on January 22, 2014 by David Jevans in Blog, security 10 Security Blogs You Should Be Reading With security the top IT concern for companies, it's critical that professionals stay current with breaking security news. Any business that leverages technology should understand what it can do to pr...
Posted on January 14, 2014 by David Jevans in Blog, security The Biggest Security Breaches of 2013 In 2013, millions of accounts were compromised. Customers suffered and businesses lost millions of dollars due to the massive security breaches that took place. However, these security breaches are on...
top-100-security-experts-80x80 Posted on November 20, 2013 by David Jevans in Blog, security 100 Security Experts to Follow on Twitter As the worldwide security technology market is forecasted to grow 28% by 2016, according to Gartner, companies are continuing to strengthen their security technologies. With security being the pri...
Posted on October 21, 2013 by David Jevans in Blog, security One in Four Young Adults Experience Hacked Accounts New research by Marble Security indicates that more than 1 in 4 U.S. young adults born between 1980-2000 have had online accounts hacked. The national average — regardless of age — is closer to 1 ...
ushomelandsecuritylogoTN Posted on August 27, 2013 by David Jevans in Blog, security FBI and Homeland Security Warn of Android Security Risks The US Department of Homeland Security has circulated a report to government agencies, including fire departments, ambulance services and police, warning of the risks of Android mobile devices. The...
phishing-activity-reportTN Posted on August 5, 2013 by David Jevans in Blog, eCrime, security APWG Releases Latest 2013 Phishing and Malware Report The Anti-Phishing working group has released their latest 2013 phishing and malware report.  Click here to download the full report from www.apgw.org. Broad-based phishing attacks declined in nu...
Posted on August 5, 2013 by David Jevans in Blog, security “Good” Trojan Horse??? Dove, a maker of soap, released a Trojan into the art world.  This Trojan horse malware tampers with Photoshop files, and attempts to educate artists that modifying body images for advertising is "wr...
Posted on June 27, 2013 by David Jevans in Blog, eCrime, security New insight into bank hacking and malware – carberp source code leak Even hackers get hacked. The source code software for the Carberp malware has been leaked onto the Internet. Carberp is sophisticated criminal software that can infect your PC and allow criminals to...
1 2 3 5