Consumers are becoming more aware of how their information is being used online, particularly when it comes to ad targeting. Interestingly, recent studies show that consumers are more comfortable with certain businesses, such as grocery stores, using their information than others, such as Google. Why are consumers more distrustful of certain ad targeting? Read on to find out.
Continue reading… Ad Targeting: Trust Merchants, Social Media, and Mobile Providers with Personal Information
It’s summertime, which means you are likely making plans for a few short trips, or an extended vacation. While you make your travel plans and make arrangements for your pets and mail, keep the following tips in mind to keep your vacation worry-free.
Continue reading… Summer Travel Security Tips
If you’re a serious computer gamer, you know that a fast computer system, a high-speed connection to the Internet, and minimal interruptions are essential to a good gaming experience. When the need for speed is critical, you might be tempted to turn off your computer’s security software to avoid annoying security alerts or slowdowns caused by routine antivirus scans or updates to the software.
Continue reading …Gaming Online Without Sacrificing Security
Millions of spam messages are sent each day. Hundreds and thousands of computers take part in a distributed denial of service (DDoS) attack against a single Website. The scary part is the fact that your computer may be doing all these things without your knowing anything about it. Your computer may be a zombie and operating as part of a botnet.
Continue reading… Is Your PC a Zombie?
Mobile devices are a cause of concern for organizations. Sensitive corporate information can be transported and lost via iPhones and Androids, and the BYOD movement has increased the number of expensive security incidents. Here, we take a look at the impact of mobile devices on information security.
Continue reading… The Impact of Mobile Devices on Information Security