What is a Man-in-the-Middle Attack?
The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it
689 articles
The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it
If a website is compromised by a careful, talented, and well-funded attacker, then the scary reality is that no one will probably ever know that the site had been hacked
We all want the newest and best of everything. That’s why every time the latest device comes out we rush to upgrade our suddenly outdated version. Less than 6 percent
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
WordPress has become one of the more popular web platforms, both for personal and professional websites, because it is simple to use and yet very flexible. But this popularity also
Facebook recently announced the return of facial recognition for photos, and as tends to happen whenever the company announces new features for its site, privacy advocates are wary of this
Today’s teens live in a world in which much of their lives — scholastic, social and otherwise — take place online. This puts parents in the difficult position of wanting
Pop-up ads aren’t the massive problem they once were, but they’re still a nuisance. And because most reputable sites now steer clear of them, a lot of the pop-ups that
The official Day of Love has arrived, so many of us will receive traditional anonymous Valentines – most of them in electronic form nowadays. Usually it doesn’t take a genius
Massive multiplayer online games — MMOGs — have become hugely popular in recent years, which means, unsurprisingly, that they’ve become big targets for attackers. These games create alternative universes, often
Aside from the endless hours we spend on Gchat at work, online chatting is mostly a kid’s game. But the responsibility falls on adults to know the basics of safe
Updated: January 30, 2015 These now-familiar square images you see in ads, magazines and posters have proved to be the easiest and cheapest way to link the real and the
At the start of each year, many people make resolutions to better themselves, but for many of them those efforts have dissipated by the time February rolls around. Well, the
Hardly a month seems to pass that Facebook doesn’t scare the wits out of privacy advocates, and Mark Zuckerberg’s social networking behemoth may have just created its biggest flap yet
These days we conduct so much of our lives online that invariably – whether it is with our online bank accounts, our shopping sites, our credit cards, our emails –
Google’s social networking site, Google+, continues to grow in popularity. But as with all social media sites, over-sharing your personal information is easy to do on Google+. Use these 10
It’s that time of year when, in the afterglow of the holiday season we start to play with all of our new toys. For a lot of people that will
You probably hadn’t even thrown away the wrapping paper and upgraded from pajamas to pants before you were knee-deep in your new computer (probably a laptop of one brand or
It may seem like a great idea to become Facebook friends with people overseas that you’ve never met – and never will meet – but Facebook has a suggestion: don’t