We’re pretty terrible at coming up with good passwords, but if you thought we were better when it comes to Android lock patterns, you’d be wrong. New research shows that the tic-tac-toe style patterns people devise to unlock their phones often follow dismally predictable rules.
So Shellshock is the newest vulnerability that may "break the internet." The last time they said that, it was about Heartbleed. Do I really need to be worried about all these bugs and vulnerabilities, or is this stuff tech companies need to care about? Can someone actually use these against me?
We all know the basics—strong passwords, two-factor authentication, and so on. However, the most recent security and privacy breaches have had less to do with bad passwords and more to do with social engineering. Let's look at what that is, why it can happen without you knowing, and how you can protect yourself.
Most of us know spam when we see it, but seeing a strange email from a friend—or worse, from ourselves—in our inbox is pretty disconcerting. If you've seen an email that looks like it's from a friend, it doesn't mean they've been hacked. Spammers spoof those addresses all the time, and it's not hard to do. Here's how…
Confession time: I don't lock my phone. No password or key, no swipe pattern, no fingerprint scan. Nothing. It's really stupid and I will probably regret it someday.
Those who use Google Apps probably assume data is safer in a cloud than it is on a laptop, prone to being dropped and spilled upon. Spanning Backup says otherwise, offering data protection services against data loss on Google's end.
If you needed another reason to keep your sysadmins happy: Out of 300 IT pros polled by security company Cyber Ark, 88% said they would steal sensitive data or futz with master login passwords if they happened to be fired. Granted, this is a study publicized by a company that offers services to protect networks…