The 5 biggest cybersecurity myths, debunked

The Internet used to be called “A domain for the nerds,” until everyone began to use and depend on it. Today, cybersecurity is viewed the same way - that quote is from a White House official earlier this year. Recognizing that cybersecurity is a comprehensible, manageable challenge for all of us is a key step towards a solution.


5 Essential Steps for Keeping Your Computer Safe

Computers house so much of our personal data that it’s essential to set up protective measures in case of cyber attack or mechanical failure. These five must-do steps dramatically increase the odds your computer (and your privacy) will remain safe from the latest online criminal activity and let you salvage your most important files if your computer becomes irretrievably infected.

Smartphone Anti-Theft Database: What's Enterprise Impact?

When it comes to data theft in the BYOD age, malware is a concern but the most prominent threats involve lost or stolen devices. To discourage would-be thieves, major U.S. phone carriers -- notably T-Mobile, AT&T, Sprint and Verizon -- have activated a database to track missing mobile phones and block them from being used.


Subscribe to malware