Eric Geier Avatar
  • 5 Ways to Make Your Browser More Secure

    While installing antivirus software is a good start to safe Internet browsing, it’s only a start. There is much more you can do to help protect yourself when browsing the…

  • How to Secure DNS with DNSCrypt & DNSSEC

    Like most of the network protocols and systems in widespread use today, the Domain Name System (DNS) harbors significant security vulnerabilities. Though DNS provides a deceptively simple service — translating…

  • How to Secure Your Facebook Business Page

    Do you manage a Facebook Page for your business or organization? If so, you’re probably aware that many of the same security issues that plague personal profiles also apply to…

  • Hiring Hackers and Buying Malware is Easy

    In the earlier days of computers, virus writers and hackers were viewed as fame-seeking and adrenaline-hungry teens with nothing better to do. But as PC usage and the Internet grew,…

  • Is Your Free AV a System Hog?

      The effectiveness of malware detection, how well it catches infections, is the chief characteristic to consider when choosing an antivirus program. But resource consumption, how much system resources it…

  • 8 iOS Security Apps for Jailbroken Devices

    Due to the iOS design, there are a limited number of security apps in the Mac App Store. However, jailbreaking your iPhone, iPad, or iPod Touch gives apps more control…

  • Tools to Deploy 802.1X on Mobile Devices

    Deploying WPA2-Enterprise security with 802.1X authentication across your Wi-Fi network of PCs is already quite a task. Adding in support of all the mobile phones and tablets makes it even…

  • Review: SUPERAntiSpyware 5

    SUPERAntiSpyware recently released version 5 of their antispyware and malware protection program, which they call their most significant update ever. In this review, we’ll take a look at the updates…

  • Intro to Next Generation Firewalls

    The traditional stateful firewall filters traffic based upon ports and protocols. For example, blocking or allowing the entire port 80 for HTTP traffic or port 443 for HTTPS traffic. It’s…

  • More Tips on Removing Viruses and Malware

      The first thing to do is determine the validity of any antivirus alerts. A popular malware technique is to display alerts saying a computer is infected in hopes of…

Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis