Watch out for distributed spam distraction

A lot of people get a handful of spam in their email inboxes every day. While spam can be a nuisance, it only takes a few minutes to delete or block spam. But if you receive tens of thousands of spam all at the same time, a huge chunk of your time and energy will be wasted on dealing with them — and they might actually be hiding telltale signs that you're being attacked by cybercriminals.

iPhone security impenetrable no more

Cellebrite claims that they have devised “undisclosed techniques” to unlock Apple devices running on any iOS operating system. The U.S. government contractor based in Israel recently notified clients of their ability to circumnavigate iOS protections that’s part of their new service for forensic specialists and law enforcement.

Chrome and Safari: hackers’ newest tools

Filling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking a plane ticket, and doing other types of online registration. With many of today’s transactions done online, people have become accustomed to relying on their browsers’ autofill function to save time.

4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better.

Common cloud computing misunderstandings

Setting up an IT infrastructure for a small business can be an intimidating and costly venture. Fortunately, cloud computing has given companies affordable and flexible solutions to deal with rapidly advancing technological demands. However, for the small business owner, there are still many common misunderstandings about using cloud services.