The Impact of Mobile Devices on Information Security
Mobile devices are a cause of concern for organizations. Sensitive corporate information can be transported and lost via iPhones and Androids, and the BYOD movement has increased the number of...
View ArticleSummer Travel Security Tips
It’s summertime, which means you are likely making plans for a few short trips, or an extended vacation. While you make your travel plans and make arrangements for your pets and mail, keep the...
View Article7 Ways to Protect Your Android Device
Android devices seem to be continually under attack, with new reports of malware almost every day. However, the biggest threats against your Android phone or tablet aren’t malware, but rather...
View ArticleHow to Turn on Two-factor Authentication for Your Email Accounts
Our email accounts contain a ton of information about ourselves. We sign up for bank accounts, buy things online, and communicate with others using our email addresses. And the only thing keeping the...
View ArticleWhat to Do When Your Device is Stolen
Your iPhone or iPad probably has your entire life on it—from photos, apps, contacts, and communications. What would you do if it is ever stolen? There are some preemptive measures you can take to make...
View ArticleProtecting Kids Online
With kids accessing the Internet to check their email, to browse the Web and play online games, or just to stay connected with friends and family through chat or social networking services, the risk of...
View ArticleChecking-In: Are You Giving Away Too Much Information?
The phenomenon of people using their smartphone or tablet to check-in to places has become extremely popular in the recent years. Location-based social networks such as Foursquare, Twitter, and...
View ArticleOctober is National Bullying Prevention Month: Take a Stand Against Bullying
Bullies come in all shapes and sizes… and forms. We here at ZoneAlarm want to take a stand this October, National Bullying Prevention Month, to bring awareness to the online kind – the cyberbullies....
View ArticleSmartphone Theft in the US: Are You an Easy Victim?
Your mobile device is a valuable target to thieves. You never know when one will strike: one minute you’re typing a text, and the next, your smartphone is snatched right out of your hands. We show how...
View ArticleHow to Turn on Two-step Verification for Your LinkedIn Account
If you’re an employee or someone who is looking for an employer, you likely have a LinkedIn account. Your LinkedIn account not only connects you other employees and employers, but it also contains...
View ArticleThe Risks of Public Hotspots: How Free WiFi Can Harm You
Practically anywhere you go, you’ll come across public WiFi hotspots. However, this free service could spell trouble. We explore the security risks of public hotspots and what to consider before...
View ArticleIt’s the Most Wonderful Time… for SEO Poisoning!
‘Tis the time of year for eggnog and holiday tales. Here is a holiday story for you to be mindful of when browsing online. When searching for something on the Web, most people type in a few keywords...
View ArticleSecurity Resolutions for the New Year
Another new year means new resolutions! And while we’re not going to push you to exercise more, we do want to encourage you to be more secure when you’re online. So to start 2014 on the right note,...
View ArticleWhy You Should Take Your Passwords Seriously
Unfamiliar messages. Passwords that no longer work. These are just two of the many clues that cybercriminals have gotten a hold of your password and broken into your account. With the password...
View ArticleHTTPS: The S is More Than Just a Letter
Anyone who has ever used the Internet has looked up at their browser’s address bar and noticed a series of letters that either looks like this ‘HTTP’, or like this ‘HTTPS’. At first glance, it may seem...
View ArticleFive Myths About Malware You Need to Know
Malware is everywhere. You can get infected by opening up a rigged attachment in your email, or by visiting a booby-trapped website that automatically downloads malware on to your computer. Once...
View ArticleThe Man-In-The-Browser: It Hungers For Your Online Credentials
Imagine you’re trying to log into your online banking account. Rather than being directed to the page you’ve requested after entering in your User ID and password, an additional field appears and asks...
View ArticleWeak Passwords: Are You Making It Too Easy For Criminals?
The password to your online account is like the key to your front door. How strong are your passwords? We’ll address some troubling facts about weak passwords and what you can do to make them stronger....
View ArticleWhat You Need To Know About Peer-to-Peer File Sharing
BitTorrent. uTorrent. The Pirate Bay. These are just a few of the many popular peer-to-peer (P2P) file sharing sites you’ve probably heard of. Since its increase in popularity in the late 1990s, P2P...
View ArticleAre You Making Yourself a Victim of Cybercrime?
Did you know some things you do on the Web could actually be putting your PC and personal information in jeopardy? Here are some mistakes and misconceptions that could make you a victim of cybercrime,...
View Article
More Pages to Explore .....