From Our Partners
Top IT Security Bloggers
Dick Cheney feared assassination by wireless heart hack
Dick Cheney, the former vice president of the United States, was so worried about the possibility of a hacker assassinating him that he had the wireless feature of his implanted heart defibrillator deactivated.
Microsoft pulls Windows RT 8.1 Update after tablets blue screen
Microsoft has been forced to halt downloads of Windows RT 8.1 operating system, after users experienced what Microsoft describes as a "situation" with the free update.
Belgium’s largest telecom firm investigates new (state-sponsored?) hack against it
Belgacom, Belgium's largest telecom company, has said it is investigating a new hacking attempt against its systems...
...just one month after it was revealed that GCHQ planted spyware on its servers.
Google Chrome to help unsafe, insecure XP users surf the net… putting the rest of us at risk
Gee thanks for nothing Google. Your latest decision regarding Chrome could put many of us at risk on the internet.
Hackers target security firm’s CEO via limo service
Chinese hackers are suspected of posing as a security firm's limo service, in an attempt to infect the CEO's computer.
Hacking and cybercrime evolution at IP EXPO
Neither breaking the law nor poor renditions of power ballads should ever be considered a qualification to speak at an IT event about computer security.
Inside the mind of an online predator
Do you know the warning signs of an online predator?
Take care that you and your friends and family don't fall victim to an internet stalker.
Try the (almost) realistic Facebook security simulator
With just 20 seconds until Facebook rolls out new privacy settings, can you scramble to choose the safest options?
Finally! Yahoo Mail to turn on SSL by default in 2014
Seriously, it will be good to see Yahoo finally enable SSL/HTTPS for all its webmail users. It's just a shame that they have dragged their feet so much about doing it.
Mikko Hypponen: “You should not be worried about PRISM. You should be outraged”
We should not just accept such blanket and wholesale surveillance from one country onto the rest of the world, argues security expert Mikko Hypponen.
Banking & Finance
Social Networking Security
Wireless / Mobile Security
Malware / Cybercrime
PCI & Compliance
Identity & Access
Identity & Access
Identity Theft Prevention
Strategic Planning / ERM
Metrics / Budgets
Security Career Staffing
Women in Security
Resources / Whitepapers