In light of recent incidents that exposed security holes in U.S. government agency systems, President Barrack Obama issued a memorandum mandating the strict use of secure connection protocols on all publicly accessible websites and services.
The US House of Representatives voted to end the bulk collection of phone metadata being done by the NSA, aiming to strike a better balance between national security and privacy. But how will things change and what will it mean to you?
Understanding the ecosystem of hardware, software, and services used in each organization’s network, the data/telemetry collected and sent outside it, as well as the challenges caused by the emergence of the Internet of Things (IoT).
While Facebook is still the go-to place for many social purposes, newer social apps make it convenient for teens to capture and share fresh and fleeting moments. Get the latest tips on how to help your teen use them safely.
Phishing continues to be a popular method used by cybercriminals to trick users into giving out their personal information and credentials. Before you become a victim, learn about popular phishing techniques, and how to spot a phishing attempt.
How dangerous is it to leave your personal information—your name, your social security number, your credit card and financial details, even your email address and phone number—where other people can access them?