From Our Partners
Top IT Security Bloggers
Hackers target security firm’s CEO via limo service
Chinese hackers are suspected of posing as a security firm's limo service, in an attempt to infect the CEO's computer.
Hacking and cybercrime evolution at IP EXPO
Neither breaking the law nor poor renditions of power ballads should ever be considered a qualification to speak at an IT event about computer security.
Inside the mind of an online predator
Do you know the warning signs of an online predator?
Take care that you and your friends and family don't fall victim to an internet stalker.
Try the (almost) realistic Facebook security simulator
With just 20 seconds until Facebook rolls out new privacy settings, can you scramble to choose the safest options?
Finally! Yahoo Mail to turn on SSL by default in 2014
Seriously, it will be good to see Yahoo finally enable SSL/HTTPS for all its webmail users. It's just a shame that they have dragged their feet so much about doing it.
Mikko Hypponen: “You should not be worried about PRISM. You should be outraged”
We should not just accept such blanket and wholesale surveillance from one country onto the rest of the world, argues security expert Mikko Hypponen.
Death Age Facebook virus hoax spreads across social network
A new virus hoax is spreading on Facebook, shared by well-intentioned users who believe they are warning their friends and family about a threat - but, in reality, are just adding to the noise.
How to stop Google using your face and name in adverts
Google is going to allow companies to use your name and face as an endorsement in adverts.
Here's how to stop it.
Facebook removes privacy for users who wanted to be “unsearchable”
Facebook is removing an option that has protected the privacy of some users - who didn't want complete strangers to be able to look them up by name.
It's the latest erosion of privacy forced upon users by the social network.
Metasploit website hijacked by pro-Palestinian hackers… via fax
Rapid7's Metasploit is the latest high profile website to fall foul of a pro-Palestinian group of hackers, who hijacked its DNS records.
And it seems the hackers used an old-fashioned fax message to commit their crime.
Banking & Finance
Social Networking Security
Wireless / Mobile Security
Malware / Cybercrime
PCI & Compliance
Identity & Access
Identity & Access
Identity Theft Prevention
Strategic Planning / ERM
Metrics / Budgets
Security Career Staffing
Women in Security
Resources / Whitepapers