This week in Washington, DC, many of computer security’s best and brightest minds have gathered to present research and to offer training on the latest attack...
As an information security engineer, I tend to spend a lot of time planning how to prevent bad things from happening to computers and information. In...
If you read my weekly GottaBeSecure articles, you’ll know that WiFi security is one of my favorite topics. Many people ask me, however, whether cell phone...
Although most modern operating systems come with a built-in software firewall, sometimes it’s hard to know for sure whether the thing is turned-on and exactly how...
Chances are you’ve heard news stories about lost or stolen laptops that containing volumes of employee or customer social security numbers, credit card numbers, and other...
> What makes for a good mobile security product? After last week’s onslaught of new products and gadgets at CES, I sat down to think about...
Remember, you heard it here first…Wi-Fi hacking is on the rise Got a Wi-Fi security story to tell? GBM readers can benefit from your experience–write a...
Despite the appearance of biometric security devices in many new mobile computing platforms, password security still remains the Achilles’ heel of the computer security world. Why,...
For nearly three months I’ve been writing a column on what I call "mobile security." In past articles I’ve examined the dangers of public WiFi networks,...
As a mobile user, I often use Skype as a cheap, easy replacement for a more costly teleconferencing system. But have you ever wondered how secure...
>I am normally not overly concerned about privacy. I am the kind of person that gladly signs up for a grocery store rewards program (surrendering all...
If you’ve been reading my mobile security column over the past several weeks, you know that most everything you do on a public network (email, web...
If you’re a mobile PC user, you probably have a network at home. Maybe you only have one other computer connected to your home network (or...
Managing security in a mobile world can be a challenging problem. That is why we’ve devoted a feature series to it, called GottaBeSecure. Terry Bradley has...
Over the past few weeks, we’ve discussed passive mobile security threats, active hacker threats, and tablet PC theft. In the final installment of this series on...
As a computer security professional I tend to spend a lot of my time reading about and researching sophisticated attacks against computer systems and high-tech ways...
In Part 1 & Part 2 of this series about mobile security, I discussed the dangers of having your data intercepted while using ““open†wireless networks...
In Part 1 of this series about mobile security, I described the dangers of having your web connection intercepted through a technique known as wireless ““sniffing.â€Â...
Ahhhh, the joys of the mobile office checking email on a sunny morning from an outside table while enjoying a steaming cup of fresh coffee. Or...