Private U.S. networks vulnerable to cyber attack: Pentagon

/
Privately-owned U.S. computer networks remain vulnerable to cyber attacks, and many U.S. companies are not doing enough to protect them, Deputy U.S. Defense Secretary Ashton Carter said on Wednesday.

Privacy Threat Model for Mobile

/
Evaluating privacy vulnerabilities in the mobile space can be a difficult and ad hoc process for developers, publishers, regulators, and researchers. This is due, in significant part, to the absence of a well-developed and widely accepted privacy threat model.

Microsoft Urges Customers to Install Security Tool

/
Microsoft Corp urged Windows users on Monday to install a free piece of security software to protect PCs from a newly discovered bug in the Internet Explorer browser.

Laptop Security Tips: How to Keep it From Getting Lost or Stolen

/
Treat your laptop like cash Get it out of the car, don't ever leave your laptop behind Keep it locked, use a security cable Keep it off the floor, or at least between your feet. Keep passwords somewhere else, not near the laptop or case Don't leave it “for just a sec” no matter where you are Pay attention in airports, especially at the security check If you have an alarm, turn it on

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 3/3

/
An annotated bibliography is a bibliography that gives a summary of a body of work such as an article, research or thesis. HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security.

An Annotated Bibliography of Human-Computer Interaction Security (HCISec) Body of Works 2/3

/
HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security. Its aim, in plain terms, is to improve the usability of security features in end user applications.