• 12 de agosto de 2014
    Security issues such as the Heartbleed bug and a number of huge data breaches were the main attractions of the second quarter of 2014. Targeted industries and security companies responded in varying fashion, all in the name of protecting end-users.
  • 25 de abril de 2014
    As you spend more time online¡ªwhether you¡¯re sharing your thoughts, photos, stories, or simply browsing pages¡ªyou reveal more data than you think. Your normal browsing activities can actually become the very thing that violates your own privacy.
  • 06 de abril de 2014
    live casino online CTO Raimund Genes explains why an enterprise needs to focus on what really needs to be protected: their core data.
  • 24 de febrero de 2014
    If you think how you¡¯re using your mobile device is secure enough, you may want to reconsider. You may be guilty of doing things that are jeopardizing your own security every time you're on your tablet or smartphone.
  • 24 de febrero de 2014
    What you need to know about mobile privacy, and what you need to do to prevent cybercriminals from getting to the files and information on your mobile device.
  • 21 de octubre de 2013
    Privacy policies can be overwhelming to read because of thir length and use of complicated terms. To make things simple, here are some key points you should check out.
  • 17 de septiembre de 2013
    How new mobile technology, such as the Touch ID sensor on the iPhone 5S, is addressing the "password problem"