This ad will close in

Security

Cybercrooks Tire of Windows -- They're After Your iPhone Now

BY
Smartphone apps are particularly vulnerable to hackers as they access user information without permission.
January 28, 2011 in Security
10 Data-Security Measures You Can't Do Without

10 Data-Security Measures You Can't Do Without

Using these simple methods can protect your business and your peace of mind.
November 4, 2010 in Security
Moving to Macs? Don't Forget About Security

Moving to Macs? Don't Forget About Security

BY
Six steps small businesses can take to protect their Macs
October 4, 2010 in Security
How to Protect Remote Employees' PCs from Security Threats

How to Protect Remote Employees' PCs from Security Threats

BY
If you're not careful, hackers could cost you the money you were trying to save in the first place.
July 27, 2010 in Security
Protecting Against Worms, Viruses and Hackers

Protecting Against Worms, Viruses and Hackers

BY
4 simple ways to secure your computer network
July 16, 2010 in Security

Should You Farm out Your Data Protection?

BY
Now, even your security can be handled by cloud computing software--but consider these factors before you get on board.
March 18, 2010 in Security

Social (Networking) Security

BY
How to Keep your company safe from privacy leaks online
October 20, 2009 in Security

10 Tips for Home-Based Employee Computer Security

BY
You're saving money by sending them home, but is the technology they use secure?
May 15, 2009 in Security

How to Plug Security Holes in Your Browser

BY
To protect your browsing history, try the free private Browsing Feature in Apple's Safari or the Distrust add-on for Firefox. For complete anonymity, try the fee-based Anonymizer or the free Tor.
March 12, 2009 in Security

How to Stop Operating-System Attacks

BY
Learn which antivirus pop-up ads may be fraudulent. Also, Mac users need security updates, too.
March 12, 2009 in Security

How to Safeguard Your Online Security

BY
Use these tips to guard against security attacks related to your Facebook, MySpace, or Linked-In activity. Also, learn how some banks are making credit card shopping safer.
March 12, 2009 in Security

A Leash on Your Laptop

BY
New tracking software monitors your missing laptop's whereabouts.
November 14, 2008 in Security

Just What Color Is a Security Hole?

BY
Patch critical flaws in a color manager and IE. Plus: Opera, Office fixes.
September 30, 2008 in Security

When to Worry About Security Holes--and When Not To

BY
Annoyed by all the computerese that litters security stories? Here's your guide.
August 26, 2008 in Security

10 Quick Fixes for the Worst Security Nightmares

BY
Most security attacks are targeted at a few weak points on your PC that aren't that hard to protect. Follow these simple tips, and you'll suddenly be a whole lot safer.
August 4, 2008 in Security

Safest Way to Bank Online? Your Cell Phone

BY
Phones are off the radar for most hackers today. But Google's Android OS and the iPhone could make them more of a target.
May 4, 2008 in Security

9 Steps to Better Security

BY
As your business gets more dependent on technology, your computer becomes more targeted by hackers and others constantly on the prowl for vulnerabilities.
April 9, 2008 in Security

Sites' Personal Questions May Pose Security Risk

Asking about your mother's home town is supposed to help legitimate sites protect your online accounts--but experts say hackers know more about you than you might think.
March 25, 2008 in Security

Jerks of the Web

BY
We've all run into obnoxious people on the Internet. But these are the kinds of idiots who make you feel like logging off permanently.
March 3, 2008 in Security

How to Stop Laptop Theft

If you run a small business, your biggest IT worry is probably not when or whether to upgrade to Vista; it's how to keep your valuable equipment--and the even more precious data it contains--out of the hands of thieves.
January 1, 2008 in Security

How to Buy and Sell on eBay Scam-Free

BY
Don't give up on the biggest auction marketplace because of fears of fraud. Here's how to buy and sell without a hitch.
January 1, 2008 in Security

All-in-One Security Suites: Tried and Tested

BY
We check out eight products, from the popular to the relatively unknown. They can't protect you from everything, but some come close.
December 1, 2007 in Security

Internet Security

BY
BitDefender was an excellent performer among security suites, but it's best for experts who don't need guidance regarding security extras and pop-up alerts and who don't mind therough interface.
November 29, 2007 in Security

Trend Micro Internet Security 2008

The Trend Micro security suite combines a good feature set and solid malware disinfection, but those benefits are offset by below-average detection as well as interface and installation bugs.
November 29, 2007 in Security

Norton Internet Security 2008

Symantec's Norton Internet Security 2008 suite offers solid security protection and features, including the best behavior-based defense against unknown threats.
November 29, 2007 in Security

Identify Tracking Cookies in Firefox

BY
Find out what entity is responsible for each cookie you accumulate while surfing the Net.
September 26, 2007 in Security
Ads by Google

Most Shared Stories

Ads by Google