John P. Mello Jr.

Contributor

John Mello writes on technology and cyber security for a number of online publications and is former managing editor of the Boston Business Journal and Boston Phoenix. Disclosure: He also writes for Hewlett-Packad's marketing website TechBeacon.

Short on security expertise? You can still choose the right solutions

5 keys to protect your supply chain from cyberattacks

5 keys to protect your supply chain from cyberattacks

The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important.

How MIT's Fiat Cryptography might make the web more secure

How MIT's Fiat Cryptography might make the web more secure

By automating the writing of cryptographic algorithms, Fiat Cryptography can remove errors, produce more secure code, and boost performance.

What is spyware? How it works and how to prevent it

What is spyware? How it works and how to prevent it

Spyware is a broad category of malware designed to secretly observe activity on a device and send those observations to a snooper. It is used by everyone from nation states to jealous spouses.

Hamamatsu eliminates malware with virtual appliances

Hamamatsu eliminates malware with virtual appliances

OpenDNS rescues optical sensor maker from crippling infections.

Death of antivirus software greatly exaggerated

Death of antivirus software greatly exaggerated

After years of predicted demise, AV software continues to protect.

HTTPA: New tech transforms transparency into privacy

HTTPA: New tech transforms transparency into privacy

Privacy by obscurity is dead; long live privacy by transparency

Security incidents tracked on Radar of Seattle Hospital

Security incidents tracked on Radar of Seattle Hospital

Software simplifies compliance with HIPAA rules

Hadoop's success drives efforts to make it more secure

Hadoop's success drives efforts to make it more secure

Security seen as key to enterprise acceptance

Brown HIV researchers make Dropbox secure with nCrypted Cloud

Brown HIV researchers make Dropbox secure with nCrypted Cloud

Consumer tech acceptable for sensitive data with a little help from encryption

Malicious advertising offers broad reach and quick rewards for malware perpetrators

Dynamic, expanding advertising scene opening juicy targets for Internet bandits

CryptoLocker's success will fuel future copycats

Ransomware with unbreakable encryption will attract cyber bandits like flies to offal

Load More