What are the different types of hackers and how do they work? Read the article.
That 40% you save on softwareCould Cost You
Everyone loves a bargain. But that too-good-to-be-true price on the latest software could end up costing you time, money and business.
Using pirated softwareputs your data and privacy at risk
Pirated software often includes malicious code that swipes your financial and personal data, and can even activate your webcam.
33% of software is counterfeitand the malware market is $114 billion
A malware investigation conducted by IDC and commissioned by Microsoft alleges 33% of software is counterfeit and sizes the malware market at $114 billion.
The New York Times investigates the distributed denial of service, or DDoS, attack and how to stop one’s occurring in the future. Read the article.
Jon Berroya, Senior Director of Global Internet Enforcement Team at BSA discusses the Kentucky-based defense contractor facing prison time for buying and using pirated software. Read the article.
What is a malicious profile and what comonly used device can it hack? Read the article.
The Android OS has been identified as a popular target for hackers. This article has tips to help Android users avoid common security pitfalls. Read the article.