by admin | Feb 23, 2019 | Uncategorized
Data breaches, widespread malware attacks and microtargeted personalized advertising were lowlights of digital life in 2018. As technologies change, so does the advice security experts give for how to best stay safe. As 2019 begins, I’ve pulled together a short list...
by admin | Feb 23, 2019 | Uncategorized
About a quarter of internet users use a virtual private network, a software setup that creates a secure, encrypted data connection between their own computer and another one elsewhere on the internet. Many people use them to protect their privacy when using Wi-Fi...
by admin | Feb 23, 2019 | Uncategorized
The deluge of cyber attacks sweeping across the world has governments and companies thinking about new ways to protect their digital systems, and the corporate and state secrets stored within. For a long time, cyber security experts have erected firewalls to keep out...
by admin | Feb 23, 2019 | Uncategorized
A cybersecurity expert says multifactor authentication has had a positive effect. Josephine Wolff raises legitimate questions about the effectiveness of two-factor authentication and its use as a best practice. But she engages in the timeless tradition of using FUD —...
by admin | Feb 23, 2019 | Uncategorized
Travel companies were hit by one data breach after another last year — firms including Marriott, British Airways, Delta Air Lines and the travel booking site Orbitz. Marriott estimates that as a result of its breach — in which the reservation database of...
Recent Comments