Computer Security Information

  • Will Passwords Soon Be a Thing of the Past?

    Google has set its sights on killing the user password… at least on Android devices. Big news from the Google I/O event as Google has unveiled the Trust API, which allows developers to use sensor and biometric data for authentication.
    By Ryan Tetzlaff June 3, 2016 

  • Security Risks That May Affect You in 2012

    As technology evolves, so does the malware that hacks and exploits it. Many threats, like viruses, worms and Trojans found on PCs, are at this point well known – but there are new threats on the horizon that can be equally dangerous.
    By M.S. Smith December 6, 2011 

  • Your Laptop Is Gone: A Guide to Protect Yourself

    Nobody likes to think about the possibility of losing their laptop. It becomes such a personal possession that the theft is more than a crime--it's a personal insult--if somebody steals it. But you've got to be prepared for the unthinkable, and...
    By Linda Richter November 15, 2011 

  • How 0-Day Threats Work, and How They Are Stopped

    You've probably heard the term "0-day" before in discussions on PC security, but it's not always apparent what the term means. Here, we're going to take a look at what these threats are, how they're different from other malware...
    By M.S. Smith November 10, 2011 

  • How to Securely Decommission an Old PC

    Learn what can be done to protect your privacy and security when it comes time to retire that old computer. Do you know how to properly wipe a hard drive? What about donation options for your old computer? We'll give you several options here...
    By Finn Orfano October 17, 2011 

  • Quiz: How Secure is Your Computer?

    Is your computer secure? Many users have viruses on their computers and don’t even know it. Others think they are sufficiently covered in case of any malicious attack. This quiz will help you figure out if you are as secure as you think you...
    By KennethSleight October 14, 2011 

  • Guide to System Security for Home and Work PCs

    Ever wonder how computer security techs can easily determine the problem of a PC? You can be like them by reading this guide. Find out about the worst exploits and issues plaguing your systems, and some of the easy ways to fix them.
    By Donna Buenaventura September 30, 2011 

  • Safely Creating and Managing Passwords

    If you regularly use a computer, you doubtlessly have different accounts online, most requiring a password. But unless you have researched password safety, you are probably vulnerable like many others.
    By Jeremy Bost September 23, 2011 

  • Mail Proxies Explained

    Mail proxies are used mostly to control Spam - to stop unwanted e-mail from being delivered to your employees. But how do they work? More importantly, is your small business taking advantage of the technology?
    By Joli Ballew August 29, 2011 

  • What are Smart Cards? Choices for Business Personal and Security

    Different types of smart cards are used by individuals and businesses as tool for identification, authentication and data protection. Find out what they are all about and how they work. Popular functions, design and applications are discussed.
    By Sheila Robinson August 25, 2011 
showing 1-10 of 203 < Previous   |   page: 1   2   3   4   5  ...   |   Next >