Tags » Computer Security

Install and configure TOR and the TOR Browser

TOR (short for The Onion Router) is a tool that offers the capability for anonymous use of the Internet.  This can hide your source IP address, but has some flaws that could potentially leak your location.   391 more words

Computer Security

MailShark National Cyber Security 2015 Champion

MailShark National Cyber Security 2015 Champion

1st October 2015 — MailShark today announced that it has become a Champion of National Cyber Security Awareness Month (NCSAM) 2015. 16 more words

Records Of 15 Million T-Mobile Customers Swept Up In Experian Hack

T-Mobile announced on Thursday the personal information of about 15 million customers was swept up in a hack on Experian, a vendor that processes the phone company’s credit applications. 345 more words


A new form of malware: the Volkswagen case

A new era has perhaps arrived where companies can employ engineers for writing cheating software to deceive the customers, the regulatory bodies as well as the testing agencies. 101 more words

Computer Security

Peeple, the review site you never knew existed, but that you're on because someone else signed you up for it

So, another day, another App or Startup.

This time it’s Peeple, a service like Yelp, but for reviewing actual people! So, it’s like a site that manages a database of information of different people and their reputations. 972 more words

Personal Opinion

Women Could Be The Solution To Fighting Cybersecurity Threats

Cybersecurity professionals are more in demand than ever before, but a new report finds the number of women in the field hasn’t grown.

Women represent just 10 percent of the cybersecurity workforce, according to a… 316 more words


CFO role expands in the age of heightened digital security

Data security is a growing concern that chief financial officers need to address, a recent IBM-Financial Executives International Canada study of cyber security and business continuity in the country found. 780 more words