Security & Privacy

Find expert advice on Internet security and how to protect your online privacy on BrightHub.com’s Internet Security & Privacy channel.In the US alone, 146.4 million users were online in March 2008 according to the latest NielsonNet ratings. As Internet use has increased, so too has ‘the dark side of the Net’ – spam, viruses, malware, trojans and hackers. This emerging field of ‘cyber crime’ has led to a variety of software designed to protect your personal information and maintain your online privacy, as well as a growing need for reliable information on best practices for safe surfing.Managing Editor J.F. Amprimoz and his team of technical writers offer an in-depth look at how to best protect your computer and your personal data. In addition to honest security software reviews, you will find original and thought-provoking technology articles such as Paul’s series on Defensive Browsing or his kid-safe browsing primer for parents: Do You Browse Like You Parent?In addition to informative technology articles and information on how to surf safely, join the Bright Hub community to comment on articles and ask questions.

A Rogue’s Gallery: Wanted Cybercrime Fugitives

They might just look like you or me, but cybercriminals have the ability to ruin lives with their selfish disregard for the livelihoods of others. Our rogues’ gallery of some of America’s most notorious cyber crime perpetrators will show you just what we mean.

The Complete Spam Reduction Guide

The senders of spam have not stopped in distracting computer users at work or at home. Spammers continue to send bulk loads of unsolicited e-mail to distribute malware or just be annoying. Learn how to stop spam using this spam reduction guide.

How to Use HTTPS Proxy Sites for Fun and Profit

Tired of getting hauled before the man for visiting ”forbidden” websites at work or school? Maybe you just hate having your web surfing habits dissected. Well, you can kill two birds with one stone thanks to HTTPS proxy servers! Learn how to stick it to the censors in this short guide!

Which Version of Bitcoin Can I Run?

If you have been wondering what all the fuss about “bitcoin” is, then it’s quite simple. This is an electronic payment method that relies on cryptography and community control. It’s an interesting concept, although it tends to be a little complicated to use.

Information Security Vulnerability Assessment Tips

Vulnerability assessments allow companies and organizations to find the gaps in their perimeter and internal IT security. Measuring your current stance against a benchmark such as the Center for Internet Security allows executives to develop strategies to protect important IT assets.

Need to Know Phishing Advice for Beginners

Phishing is something you have likely heard of, but are you aware of the dangers it poses to your identity and financial safety? Not being armed with the right information puts a target on your virtual head and makes you vulnerable to hungry predators ready and willing to make you the next victim.

The Top Online Fraud Trends of 2011

The legions of schemers and fraudsters out there continue to grow bolder and cleverer day by day. We expose some of the recent online fraud trends to give you all the information you need to protect yourself from these online parasites.