Beyond honeypots: It takes a honeytoken to catch a thief

April 16, 2013
Honeypots tell you who's attacking. But to catch individuals -- including suspected insiders -- honeytokens let you home in
Read more »

No honeypot? Don't bother calling yourself a security pro

April 09, 2013
Deploy one of these honeypots and you'll soon find out who's attacking you -- and devise a strong defense to fight back
Read more »

The two steps to radically better security

April 02, 2013
Stop wasting your money and do computer security right with two common-sense practices
Read more »

Ultimate PC security requires UEFI -- and Windows 8 or Linux

March 26, 2013
Hackers can easily 'brick' computers with malicious firmware. UEFI effectively blocks that attack vector and costs nothing
Read more »

The 5 cloud risks you have to stop ignoring

March 19, 2013
Known knowns, known unknowns, and unknown unknowns all lurk in public clouds, but you can stay ahead of the exploits
Read more »

Security will get worse before it gets better

March 12, 2013
The damage caused by threats and the number of Net-dependent critical systems are on the rise. Yet we still haven't created a safer Internet
Read more »

Are you leaking too much of your real life online?

March 05, 2013
Thieves and predators constantly search Facebook, Twitter, and Google+ for telltale information. Think before you post!
Read more »

What you can do about Chinese APT attacks

February 26, 2013
Have your defenses been breached by Chinese hackers? If you have attractive intellectual property, it's quite possible. Here's how to detect and defend
Read more »

The cyber war is real -- and our defenses are weak

February 19, 2013
The U.S., Israel, China, and Iran are funding acts of hacker aggression, and the targets are as good as sitting ducks
Read more »

Facebook's redirect error foretells the future of hacking

February 12, 2013
When so many websites link to so many others, hackers can do a lot more damage than sending users to error pages
Read more »
©1994-2014 Infoworld, Inc.