Microsoft Urges Customers to Install Security Tool

/
Microsoft Corp urged Windows users on Monday to install a free piece of security software to protect PCs from a newly discovered bug in the Internet Explorer browser.

Laptop Security Tips: How to Keep it From Getting Lost or Stolen

/
Treat your laptop like cash Get it out of the car, don't ever leave your laptop behind Keep it locked, use a security cable Keep it off the floor, or at least between your feet. Keep passwords somewhere else, not near the laptop or case Don't leave it “for just a sec” no matter where you are Pay attention in airports, especially at the security check If you have an alarm, turn it on

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 3/3

/
An annotated bibliography is a bibliography that gives a summary of a body of work such as an article, research or thesis. HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security.

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 2/3

/
HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security. Its aim, in plain terms, is to improve the usability of security features in end user applications.

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 1/3

/
An annotated bibliography is a bibliography that gives a summary of a body of work such as an article, research or thesis. HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security.

FedCyber.com Cyber Security Summit – Confronting the Next Generation of Cyber Security Challenges and Opportunities

/
The Second Annual FedCyber.com Cyber Security Summit provides a venue for our nation's most seasoned cyber security practitioners to come together to work issues of common concern.

Mobile malware surges this year, almost 700 percent over 2011 numbers

/
Mobile malware has exploded this year, growing almost 700 percent over 2011 numbers. Almost all of it, perhaps 85 percent, targets smartphones running Android.

Democrats push for open Internet, cybersecurity

/
Democrats late Sunday reiterated support for open Internet policies that protect free speech and consumer choice, stronger cybersecurity laws and the protection of movies and songs from online copyright violations.

How secure are you online? The checklist

/
Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. For the purpose of this post, we're breaking down online security into four essential parts: passwords, browsers, at-home Wi-Fi and networking, and browsing on public Wi-Fi. Within those categories we'll give you a checklist of everything you should do, from the bare minimum to the tin-foil-hat best.