Featured Blogs
Worms Could Spread Like Zombies via Internet of Things
Security researchers recently created a proof-of-concept attack against Internet-connected lightbulbs, causing breached devices to infect their neighbors. The propagation...
Keep Your Computer Close: PoisonTap Can Unlock It Almost Instantly
It’s never a good idea to leave your computer unattended. Since it carries mounds of valuable data, an unchaperoned computer...
The Holiday Season is Here, Spreading Hackable Gifts Wide and Near
It’s the most wonderful time of the year, but I’m feeling anxious — security anxious, that is. Every year, we...
Bypassing Your Passcode: How One Online Hack Can Unleash Your Photos and Texts
You keep some of your most personal information on your phone. Special photos, hundreds of contacts, important emails, private...
21st Century Bank Heist Strikes Tesco Bank, Could Portend Future Attacks
Last Tuesday, as Americans were filling out their ballots, about 40,000 U.K. citizens were left wondering what happened to their...
Could Your Kids Be Ordering Dangerous Drugs Online?
According to recent news reports, police have linked a drug named Pink to the overdose deaths of two 13-year-old boys...
So You Think Your Phone Is Hacked—Here’s What to Do
Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep...
More Capable IoT Botnets to Emerge as the ‘Pros’ Enter the Fray
On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by...
Blogging Best Practices and Hot Topics for Security Marketers
When used as part of an integrated marketing campaign, blogging can increase SEO effectiveness, help maintain mindshare, and create a...
App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality...