Private Communities Added To Google+
Whether or not you associate Google with privacy, it has always been a major component of Google+. From the beginning, Google’s “circles” sharing concept enabled the kind of social sharing experience that wasn’t available on competing social platforms. In fact, it even prompted Facebook to offer a similar option to its users.
Security Is A Priority For Yahoo Mail
Yahoo has not been making the best headlines in the realms of Yahoo Mail or security lately, but now, they’ve revealed a move that should help with that.
Security managers feel apps are vulnerable
Some interesting research findings have revealed some startling findings when it comes to the state of application security. Quotium research shows the large majority of security managers feel their organization’s applications are still vulnerable to hacker attacks, despite best efforts to employ wide range of solutions to prevent application threats. One of the most interesting findings of this study is the gap between the efforts put into protecting applications and the actual state of the applications.
With Big Trusteer Acquisition, IBM Is Set To Launch Super Security Lab
With the news, IBM is launching a cybersecurity software lab in Israel, which it says will bring together over 200 Trusteer and IBM researchers and developers to focus on mobile security, advanced cyber threats, malware, counter-fraud, and financial crimes.
Boost Holiday Sales, Beat Fraud [Free ROI Video]
Chargebacks can put a damper on holiday spirit. Especially when they show up in January of next year. Talk about a New Year hangover. Let Kount help reduce the risk of fraudulent chargebacks so you can sell more this holiday season. Our SaaS software model can have your organization up and running in a matter of days. Get ready for the holiday selling season with Kount and don't let fraud ruin your holiday profits.
The U.S. Tech Industry Is Hurt By The Existence Of PRISM
In early June, former NSA contractor Edward Snowden revealed the existence of PRISM. The leaked slides allege that the NSA has direct access to servers belonging to major tech companies like Google, Facebook and Microsoft. The companies denied that they gave direct access to the NSA, but many argued that the mere existence of PRISM would hurt the U.S. tech industry.
Getting started with Vipre Internet Security
We’re constantly experimenting with different anti-virus and anti-malware protection software on our various PC computers and decided to give Vipre Internet Security a test as part of recently upgrading one of our PCs from Windows 8 to Windows 8.1 Preview. Our results: It’s fast, easy and has some nice features that make it an option you should definitely check out.
In A Post-PRISM World, Can We Trust Tech Companies?
Trust is something that’s earned, not given. Over the past decade, we’ve come to trust tech companies with our data because they promised to keep it secure. That trust was called into question earlier this month.
Speed Up Online Sales
Manual reviews are often done to prevent online fraud, yet they are one of the most time consuming and expensive methods to reduce fraud. And in the end, 75% of manual reviews are unnecessary and eventually approved. The reality is, manual reviews should be the last line of defense in the fight against online fraud.
Two-Step Verification Launched For Twitter
After a series of high-profile hacks and calls from the user base, Twitter has finally unveiled their form of two-step verification. "Every day, a growing number of people log in to Twitter. Usually these login attempts come from the genuine account owners, but we occasionally hear from people whose accounts have been compromised by email phishing schemes or a breach of password data elsewhere on the web. Today we're introducing a new security feature to better protect your Twitter account: login verification," says Twitter.
How To Secure Your WordPress Site Against Hacker Attacks
One of the easiest content management systems to set up and use is WordPress, the largest self-hosted blogging platform in the world, powering more than 60 million websites worldwide.
Privacy Proponents Still Aren't Satisfied With CISPA
Rep. Adam Schiff announced on Friday that he would be introducing a pro-privacy amendment to CISPA that would force companies to remove any identifiable information from data it shares with the government. Surprisingly enough, the bill’s authors seem to be taking this amendment, and other pro-privacy amendments, seriously.
Is Social Media Security Out of Your Hands?
I read an interesting article from the New York Times this week. It was about the problem of social media accounts being hacked and hijacked and something bad happening to a brand. Before we get started though. let’s make it clear that if ANYONE thinks that what happened to the Burger King Twitter account where it was hacked and stuff about being purchased by McDonald’s etc. happened on it, really thinks this hurt the brand I suggest you reassess.
9 Tips for Greater Social Media Security
After a few hackers “Had it their way” with Burger King’s Twitter handle, we started thinking that password security is a big deal, and not everyone’s doing it right. Here are a few simple steps that can help you avoid a situation that would be, well, a whopper (#groan) of a public relations nightmare.
The Most Trusted Internet Company For Privacy In 2012 Was Mozilla
January 28 is Data Privacy Day. It’s a topic that has become increasingly more important in recent years as more of our information moves to the Internet. Consumers are largely untrusting when it comes to Internet companies, but one has at least earned more trust than others.