This ad will close in

Internet security

Subscribe

News and Articles About Internet security

How to Create a Super Strong Password (Infographic)
BY
In the wake of the recent Heartbleed SSL bug revelation, it's more crucial now than ever to update all of your online passwords. Here's how in one easy, neat and tidy infographic.
April 18, 2014 in Technology
Ever Want to 'Unsend' an Email? Now You Can.

Ever Want to 'Unsend' an Email? Now You Can.

BY
Pluto Mail lets you 'unsend' messages, edit unopened ones and choose a shelf-life for all your email transactions.
April 15, 2014 in Technology
4 Ways to Protect Yourself From the 'Heartbleed' Bug

4 Ways to Protect Yourself From the 'Heartbleed' Bug

BY
While the 'Heartbleed' bug is causing pandemonium in the online world, individuals need to stay calm and protect their personal information.
April 11, 2014 in Technology
This Startup Wants You to Know When a Cyberattack Is Coming

This Startup Wants You to Know When a Cyberattack Is Coming

BY
Google Ventures-backed ThreatStream has developed a real-time intel-sharing system that lets institutions detect and fight against cyber threats.
March 24, 2014 in Business News
6 Things You Should Know About 'Anti-Google' Search Engine DuckDuckGo

6 Things You Should Know About 'Anti-Google' Search Engine DuckDuckGo

BY
The search could be over for a more private way to search the Internet.
February 27, 2014 in Technology
One in 5 Mac Users at Risk as Apple Stops Security Updates for Snow Leopard

One in 5 Mac Users at Risk as Apple Stops Security Updates for Snow Leopard

BY
The popular operating system Snow Leopard -- or OS X 10.6 -- still runs on 19 percent of Macs, leaving a large chunk vulnerable to attack.
February 27, 2014 in Technology
The Beginner's Guide to Securely Using Public Wi-Fi

The Beginner's Guide to Securely Using Public Wi-Fi

BY
Open Wi-Fi networks aren't always safe ones. Make sure your devices are protected against attackers before you surf from a new place.
January 30, 2014 in Security
Google, Microsoft Take Steps to Block Searches for Child Porn

Google, Microsoft Take Steps to Block Searches for Child Porn

BY
Ahead of an internet safety summit in Britain, the two companies announced their plan to tighten online searches.
November 18, 2013 in News and Trends
Cybersecurity Basics: Surf the Web Safely With These Browsers

Cybersecurity Basics: Surf the Web Safely With These Browsers

BY
Here's a look at three of the safest browsers for doing business on the web.
September 9, 2013 in Security
Internet Users Want to Be Invisible. And They Fear Advertisers More than the Government

Internet Users Want to Be Invisible. And They Fear Advertisers More than the Government

BY
A new report released by the Pew Research Center finds that almost all Internet users have taken steps to erase their digital footprints. Just who they are trying to avoid, though, may surprise you.
September 5, 2013 in Security
What 'DDoS' Attacks Are and How to Survive Them

What 'DDoS' Attacks Are and How to Survive Them

BY
Here's how to fight back when a flood of bogus internet traffic threatens to immobilize your website.
August 2, 2012 in Security
Why You Might Need to Rethink Your Internet Security -- Now

Why You Might Need to Rethink Your Internet Security -- Now

BY
These four steps can help you move beyond firewalls and antivirus systems.
July 18, 2012 in Security
How Not to Send Customer Emails: A Lesson from Comcast

How Not to Send Customer Emails: A Lesson from Comcast

BY
If you're emailing customers promotional offers, make sure they know that they can trust your messages to minimize potential concerns over spam or malware.
September 12, 2011 in Online Marketing

How to Plug Security Holes in Your Browser

BY
To protect your browsing history, try the free private Browsing Feature in Apple's Safari or the Distrust add-on for Firefox. For complete anonymity, try the fee-based Anonymizer or the free Tor.
March 12, 2009 in Security

How to Safeguard Your Online Security

BY
Use these tips to guard against security attacks related to your Facebook, MySpace, or Linked-In activity. Also, learn how some banks are making credit card shopping safer.
March 12, 2009 in Security

5 Ways to Foil Hackers

BY
Are you the only you out there? When it comes to protecting your identity, a bit of prevention is worth a megabyte of cure.
September 7, 2008 in Management & Operations

9 Steps to Better Security

BY
As your business gets more dependent on technology, your computer becomes more targeted by hackers and others constantly on the prowl for vulnerabilities.
April 9, 2008 in Security

Sites' Personal Questions May Pose Security Risk

Asking about your mother's home town is supposed to help legitimate sites protect your online accounts--but experts say hackers know more about you than you might think.
March 25, 2008 in Security

All-in-One Security Suites: Tried and Tested

BY
We check out eight products, from the popular to the relatively unknown. They can't protect you from everything, but some come close.
December 1, 2007 in Security

Norton Internet Security 2008

Symantec's Norton Internet Security 2008 suite offers solid security protection and features, including the best behavior-based defense against unknown threats.
November 29, 2007 in Security

Internet Security

BY
BitDefender was an excellent performer among security suites, but it's best for experts who don't need guidance regarding security extras and pop-up alerts and who don't mind therough interface.
November 29, 2007 in Security

Trend Micro Internet Security 2008

The Trend Micro security suite combines a good feature set and solid malware disinfection, but those benefits are offset by below-average detection as well as interface and installation bugs.
November 29, 2007 in Security

Free Security Tool Ferrets out Unpatched Software

The tool is designed to inform users when their applications need patching.
September 6, 2007 in Security

Mitigate IM Security Threats

Follow these steps for protecting IM as a business tool.
May 14, 2007 in Security

Setting Up a Small-Business Spam Defense

Spammers are getting smarter in the ways they try to con your business. It's time to do some homework so you can outsmart them and protect your company from attack.
January 10, 2005 in Security

Most Shared Stories