Ad Targeting: Trusting Merchants, Social Media, and Mobile Providers with Personal Information

Ad targeting header

Consumers are becoming more aware of how their information is being used online, particularly when it comes to ad targeting. Interestingly, recent studies show that consumers are more comfortable with certain businesses, such as grocery stores, using their information than others, such as Google. Why are consumers more distrustful of certain ad targeting? Read on to find out.
Continue reading… Ad Targeting: Trust Merchants, Social Media, and Mobile Providers with Personal Information

Gaming Online Without Sacrificing Security

game mode- header 300x111
If you’re a serious computer gamer, you know that a fast computer system, a high-speed connection to the Internet, and minimal interruptions are essential to a good gaming experience. When the need for speed is critical, you might be tempted to turn off your computer’s security software to avoid annoying security alerts or slowdowns caused by routine antivirus scans or updates to the software.
Continue reading …Gaming Online Without Sacrificing Security

Is Your PC a Zombie?

Is Your PC a Zombie

Millions of spam messages are sent each day. Hundreds and thousands of computers take part in a distributed denial of service (DDoS) attack against a single Website. The scary part is the fact that your computer may be doing all these things without your knowing anything about it. Your computer may be a zombie and operating as part of a botnet.
Continue reading… Is Your PC a Zombie?

The Impact of Mobile Devices on Information Security

Mobile platforms with greatest security risk
Mobile devices are a cause of concern for organizations. Sensitive corporate information can be transported and lost via iPhones and Androids, and the BYOD movement has increased the number of expensive security incidents. Here, we take a look at the impact of mobile devices on information security.
Continue reading… The Impact of Mobile Devices on Information Security