web
Given the many ways in which digital certificates can be misused and the severe repercussions of such incidents, several...Read more
Online communication and data sharing practices rely heavily on digital certificates to encrypt data as well as...Read more
Google’s Inactive Account Manager allows you to designate a person to be notified if your Google account has been inactive...Read more
User authentication is usually discussed in the context of the person's initial interactions with the system—a safeguard...Read more
Web browser makers are continuing to change how they display two visual elements that people have been taking for granted:...Read more
Instead of pursuing vulnerabilities present directly in Facebook, Twitter or LinkedIn, attackers might find it easier to...Read more
When discussing scams and malicious activities that have utilized the linkedin.com website, I alluded to the use of fake of...Read more
LinkedIn includes a platform that allows advertisers to display targeted ads to linkedin.com users. The advertiser can...Read more
The website of Australia’s Herald Sun newspaper was compromised and used to attack its visitors on July 11, 2011. The...Read more
People are excited about social media. Except security people, because we are paid to worry, and new technologies make us...Read more