Search Images Maps Play YouTube News Gmail Drive More »
Settings | Sign in

Online Security

See realtime coverage

Millions of passwords stolen from Google and Yahoo users in major security breach

Daily Mail - ‎5 hours ago‎
The latest discovery came after Hold Security researchersfound a young Russian hacker bragging in an online forum. The hackers said hehad collected and was ready to give away a far larger number ofstolen credentials that ended up totalling 1.17 billion ...
See realtime coverage

Morrison: 'We can build a brighter, secure future'0:39

Herald Sun - ‎May 3, 2016‎
Measures to boost online security and counter digital terrorism have been outlined in the 2016 Budget, worth $230 million. Picture: ThinkStock.

Online security, unblocked streaming: Le VPN lifetime subscription is 88% off

The Next Web - ‎May 3, 2016‎
With the advantages of modern technology, however, you can take steps to securely safeguard yourself against malicious attacks and identity theft through a VPN (Virtual Private Network) service.

Cyber warriors needed to protect online security in UAE

gulfnews.com - ‎May 1, 2016‎
But these portals and their connected networks must be kept safe and reliable from the attacks of ever smarter hackers and online thieves,” said Abdul Aziz Al Madhloum, head of training at federal cyber security regulator, the National Electronic ...

Five most common myths about Web security

CSO Online - ‎May 3, 2016‎
Almost 3 terabytes of data stolen in the Panama Gate scandal will shortly become searchable online. Mossack Fonseca, the breached legal firm behind one of the largest data leaks in the history, had numerous high-risk vulnerabilities in its front-end ...
See realtime coverage

Internet security - Xi Jinping grasps the nettle

China.org.cn - ‎May 2, 2016‎
In China, internet security has become an issue of increasing importance in recent years, as the country is faced with the rapid cyber-networking of the whole world.

Social media scams are major online threats; PHL security deemed 'minimal'

BusinessWorld Online Edition - ‎May 3, 2016‎
CyberInt, which made the presentation assessing the Philippine situation in connection with its entry into the market, said it employs a white-hat hacker-based approach to network protection, probing for weaknesses in corporate and government systems ...
See realtime coverage

Researchers reveal major security flaws in Samsung's SmartThings system

Daily Mail - ‎May 2, 2016‎
SmartThings' app store allows third-party developers to create their own apps and sell to users for a profit. By evaluating the platform's security design and investigating the 499 SmartThings third-party apps (SmartApps), researchers found the biggest ...

Ask an Expert: All About Password Security and Internet Safety

Lifehacker - ‎May 2, 2016‎
We all know that our passwords should be long, complicated, and practically impossible to remember, but many of us still ignore those rules for the sake of convenience.

Quantum computers pose a huge threat to security

CSO Online - ‎May 3, 2016‎
Encryption often relies on the challenge of factoring large numbers to ensure security, but researchers at MIT and the University of Innsbruck in Austria recently demonstrated what they said is the first five-atom quantum computer capable of cracking ...

4 password managers that make online security effortless

PCWorld - ‎Apr 27, 2016‎
There's a reason “123456” remains the most popular password. We tend to use passwords we can easily recall. And that means they're easy to hack.
See realtime coverage

When security isn't so SWIFT

CSO Online - ‎May 2, 2016‎
There are times where I sit quietly in dumbfounded amazement at the world. When you've been working in the information security space for a couple decades one would think that you've seen it all. This has proven itself time and again as not the case.

Banks beef up online security measures

Inquirer.net - ‎Apr 26, 2016‎
Online security is a continuing effort. Banks constantly exert efforts to update their security software and protocols. On the other hand, cyber-criminals also exert efforts to overcome bank security.

Get a Lifetime of Online Security from VPNGhost for $25

SitePoint - ‎Apr 22, 2016‎
Our last $25 went to coffee and a very strange eBay bid we'd rather not disclose. A better use of $25? A lifetime of online protection from VPNGhost, now at SitePoint Shop. VPNGhost protects you online without slowing you down. Connect and VPNGhost ...

5th edition of Middle East Homeland Security Summit to be held in Amman in November

Middle East Online - ‎9 hours ago‎
AMMAN - The much awaited event on Homeland Security - the 5th Edition of Middle East Homeland Security Summit - will take place November 7-8.

How-To Info On Hacking Wireless Alarm Systems Readily Available Online

Security Sales & Integration - ‎May 3, 2016‎
Rook Security, a managed security services provider (MSSP) based here, told WRTV that information about how to hack into the SimpliSafe system is readily available on Internet, and the parts needed to pull it off are easily available online as well ...

Brussels Airport queues disappear after security checks eased

Daily Mail - ‎6 hours ago‎
BRUSSELS, May 4 (Reuters) - Brussels Airport, where 16 people were killed in suicide attacks on March 22, appeared back to normal on Wednesday after strict security checks were eased following complaints about lengthy queues and missed flights.

Maintaining a utility's security and reputational risk is vitally important

CSO Online - ‎2 hours ago‎
Building a utility's reputation may take years, but it can be damaged or destroyed very quickly from a security event. Reputational risk is regarded as the greatest threat to a company's market value and standing in the community.

In the digital enterprise, everyone is a security newb

CSO Online - ‎Apr 29, 2016‎
Suddenly I've arrived at that age where many stories I share begin with, "When I was a kid." I remember my parents had a few of those old filing cabinets where they stored all of their important paperwork.

Love Affairs with the Cloud Obscure Many Security Risks

Information Management - ‎May 3, 2016‎
The Cloud Security Alliance (CSA) recently released “The Treacherous 12: Cloud Computing Top Threats in 2016,” which provided a run-down on the greatest security threats that organizations face with cloud computing. The report's findings are especially ...
 -