3 in 10 S. Korean teens victimized by cyberbullying: study

Nearly three out of 10 South Korean teenagers have been bullied in cyberspace, but few have sought help. Types of bullying ranged from leaking private information, which was most common at 12.1 percent, to bullying while playing online games, which followed with 10.2 percent.


The 5 biggest cybersecurity myths, debunked

The Internet used to be called “A domain for the nerds,” until everyone began to use and depend on it. Today, cybersecurity is viewed the same way - that quote is from a White House official earlier this year. Recognizing that cybersecurity is a comprehensible, manageable challenge for all of us is a key step towards a solution.


Cybercrime: main targets in 2013

Cybercrime, “When the hunter learns to shoot without missing, the bird learns to fly without perching.”

This is an age-old adage that rightly depicts this ever evolving breed of criminals. These cybercriminals are each year devising fresh and sophisticated ways of developing threats that target distinct organizations, individuals and computer system. This year, 2013, is no different only that they have advanced in complexity and maliciousness at a very alarming rate.

This article shall delve into the top most predictions to cyber attacks.


NIST issues security, privacy guidance for public cloud

Many of the features that make public cloud-computing services attractive run up against government's traditional security models and controls, according to the National Institute of Standards and Technology's recently-released Special Publication 800-144 (.pdf), which tallies the threats, risks and access concerns agencies should consider before entering into such contracts. 


Subscribe to privacy