The security business is booming. In the past five years, more than 1,200 startups have joined the game, with Wall Street assigning them record valuations. At the same time, high-profile data breaches...
Forget making the football team or honor society, for teens, social hierarchy is measured by how hefty your follower count is on Twitter. Studies show that while Facebook is still the #1 social network...
We in the technology industry owe a lot to Moore’s Law, as it’s given us the foundation on which to build new technologies, applications, processes, and companies. Intel co-founder Gordon Moore's law...
Robert Siciliano is Online Safety Expert for Intel Security. He is an identity theft professional who is committed to informing, educating, and empowering users so they can be protected from crime in the physical and virtual worlds. He entered the world of helping protect identities after his small business received its first fraudulent credit card.
In the late 90s, he witnessed the exploding growth of identity theft fueled by Internet access to information, the speed of technology outpacing security and a fundamentally flawed system of identification. For more than 20 years, Robert has been researching and keeping in tune with all aspects of security by staying on top of what is new in the world of both online and offline security.
According to Robert, there always has been, there is now and there will always be a criminal predatory element stalking their next victim. Being proactive and knowing your options are essential.
Learn more: www.mcafee.com/advice.
The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the gym, a coffee house, the airport, or just a park bench— know that someone might be peering over your shoulder to see what you’re doing. The snooper could just be curious, or they could be […]
Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into revealing your credit card number or PayPal login information. But spam is an unsolicited message, sometimes referred to as junk mail. Spam can be very annoying and relentless in nature, often attempting to convince you […]
So just how are hackers able to penetrate all these huge businesses? Look no further than employee behavior—not an inside job, but innocent employees being tricked by the hacker. A recent survey commissioned by Intel Security reveals that five of the top seven reasons that a company gets hacked are due to employee actions. One […]
10 years ago, many of us were hearing about social media for the first time. Now, social media plays a giant role in our lives, allowing us to share pictures, connect with family and friends, and get updated news. Through social media, we can express ourselves to our inner circle and the world. So how […]
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; it can spread to other people through physical contact and through […]