Productivity Software

Productivity Software | News, how-tos, features, reviews, and videos

6 handling email phishing

Business email compromise: The odds of being a victim are increasing

Given the growth over the last few years in BEC and EAC fraud, businesses should educate employees about the risks involved and red flags of this activity.

nest cam iq review on shelf

Our homes are not the impenetrable fortresses they once were

Today’s homes are loaded with connected devices. However, security practitioners are still trying to catch up with the growth of smart devices.

Election 2016 teaser - Electronic voting, digital ballot boxes

How elections are hacked via social media profiling

What to expect in the 2018 midterm elections and how malvertising tactics will be used to target voters.

email security risk - phishing / malware

Cybercriminals impersonate popular file sharing services to take over email accounts

Email account takeover attacks are growing, and attackers are impersonating OneDrive and other popular web services to steal credentials from employees.

girl hands privacy stop

Can we use a social media model to improve privacy attitudes?

The advent of social privacy.

social media network connections

US wants 5 years' worth of social media history from visa applicants

Extreme vetting may get even more extreme under a new proposal that asks U.S. visa applicants for their social media accounts, email addresses, and phone numbers.

teamwork / collaboration - team members gesture across a table, amid papers, notes and a laptop

Need for collaboration among security, privacy professionals extends beyond GDPR

We live in times of promising digital transformation, with AI, blockchain and an array of IoT devices among the technologies capable of positively impacting our personal and professional lives. Yet, enterprises need to mitigate the...

donald trump

GDPR is more important than ever: The Cambridge Analytica-Facebook meltdown

Why its critical – existential in fact – for us to do our own “analytica” in this day and age.

anti facebook primary

Facebook suspends firm that took 50M users' data, says it wasn't a breach

Facebook suspended Trump-linked data firm Cambridge Analytica, which pilfered 50 million Facebook users’ data, claiming the collected personal data was not the result of a breach.

young man using a laptop with a security display in the background

Pwn2Own: Microsoft Edge and Apple Safari fall on day 1

On day one of Pwn2Own, Microsoft Edge and Apple Safari were pwned, and the hack of Oracle VirtualBox was a partial success.

social media hashtag

The power of platforms

In an age of information, the most dangerous dual-use technology is not kinetic.

anti facebook primary

Facebook survey about pedophiles raises concerns

A Facebook survey asked users if men should be allowed to ask kids for sexual pictures. It later admitted the survey was 'a mistake.'

microsoft edge browser new size

Google discloses Microsoft Edge security flaw before it could be fixed

Microsoft failed to develop a fix within the 90-day disclosure deadline, so Google Project Zero researcher went public with the details of an ACG bypass on Microsoft Edge.

shadows of team figures collaborating, each holding up gears that work together

Collaborative security

We have far too closed of a mindset when we handle security problems.

anti facebook primary

Facebook is sorry for text spamming 2FA users, blamed it on a bug

Facebook claimed a ‘bug’ was responsible for sending text spam to phone numbers provided by two-factor authentication (2FA) users.

Dislike! Social media addiction

Facebook's free VPN acts like spyware to iOS users in the U.S.

Facebook's new VPN service for iOS users in the U.S. claims to provide security protections, but it also tracks users -- collecting mobile data traffic.

email iot internet security

The life and death of a document: where did it really go?

As the Moody Blues would say, what became of that letter you never meant to send?

laptop security breach password identity theft hacker

Cybercriminals impersonate Outlook and DocuSign to steal your identity

Attackers are now impersonating popular web services like Microsoft Outlook, DocuSign and Google Docs to trick you to freely give up your credentials.

email iot internet security

Email security in 2018

Things are going to get even crazier...

meltdown spectre

Spectre and Meltdown: What you need to know going forward

As you've likely heard by now, there are some problems with Intel, AMD, and ARM processors. Called Meltdown and Spectre, the discovered attack possibilities are rather severe, as they impact pretty much every technical device on the...

Load More