• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Search

Search results

New "FREAK" Vulnerability Can Allow Attackers To Decrypt Encrypted Communications

A newly discovered vulnerability, dubbed, “FREAK”, that could allow attackers to intercept and decrypt encrypted traffic between browsers and web sites via a Man-in-the-Middle (MitM) attack, was discovered on March 3rd, 2015 by researchers. Once an attack ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Mar-2015 | 3:30PM
Comments:
2
Kudos:
1

New Vulnerability in OpenSSL Could Allow Attackers to Intercept Secure Communications

A new weakness in OpenSSL could allow attackers to hijack secure communications by tricking a targeted computer into accepting invalid and untrusted SSL certificates as valid certificates. This could help facilitate man-in-the-middle (MITM) attacks, where ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
09-Jul-2015 | 4:36PM
Kudos:
2

Encryption: How To Utilize it Online and Why It’s Important

Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key.  Today, huge amounts of personal information are managed online, via computer applications, and s ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
02-Nov-2015 | 9:42AM
Kudos:
1

Some Dell Computers Found Vulnerable to Man-in-the-middle Attacks Due to Root Certificate Vulnerability

It has been recently discovered that some Dell computers are vulnerable to man-in-the-middle attacks because of an issue with a root certification authority.  ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Nov-2015 | 3:47PM
Kudos:
2

4 Steps to Make Your Smart Home More Security Smart

“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices ...
Blog Post
Author:
J2K2 Employee
Posted:
16-Mar-2016 | 11:03AM
Kudos:
1

The Risks of Public Wi-Fi

Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you kn ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
25-Apr-2016 | 3:46PM
Comments:
1
Kudos:
3

Paying Friends Through a Mobile Payment App

Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
01-Jul-2016 | 10:30AM
Kudos:
1

#30SecTech: What Is a VPN?

There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letti ...
Blog Post
Author:
J2K2 Employee
Posted:
01-Jul-2016 | 8:31AM
Kudos:
1

The 12 Days of Norton

"We’re counting down days until Christmas is here, And gifting you cool security tips to be of good cheer, And make sure this season is the best of your year." Join us every day for a new Norton tip to keep your holidays merry and bright. A secu ...
Blog Post
Author:
J2K2 Employee
Posted:
12-Dec-2016 | 11:00PM
Comments:
10
Kudos:
0

What Is a No-Log VPN Network?

Many VPN providers safeguard their customers’ anonymity by offering a no-log network, meaning that they do not collect, or “log,” any information transmitted through the network. They don’t save information about your personal details, where you go online ...
Blog Post
Author:
J2K2 Employee
Posted:
15-Jul-2016 | 8:05AM
Comments:
1
Kudos:
2