If your smart phone, Android tablet, or iPad has become a part of your daily business or computing life, you should take its security just as serious as you do…
Unfortunately, there’s more to mobile security than the data you store. If your mobile device has Wi-Fi capability and you connect to unsecured Wi-Fi hotspots for Internet access without knowing…
As you’re likely aware, guarding your PCs from malware – viruses, trojans, spyware – and hacking is crucial for protecting your files and data. However, don’t forget about your mobile…
Security shouldn’t stop at your computer. Your mobile phones and devices are actually more vulnerable to become lost or stolen, and they can contain just as much personal and sensitive…
If you’ve implemented WPA or WPA2 Enterprise encryption for your Wi-Fi network, you probably know too well that it isn’t easy to configure the 802.1X settingson clients of a corporate…
Encrypting your documents protects them from prying eyes if your computer becomes lost or stolen. However, you shouldn’t stop at just encrypting your sensitive documents. A thief can recover passwords…
The Enterprise mode of Wi-Fi Protected Access (WPA or WPA2) encryption uses 802.1X authentication to provide better security for wireless networks. This mode should be used by all businesses and…
In this tutorial, we’ll see exactly how to configure and connect to WPA/WPA2-Enterprise networks in 10.5 Leopard and 10.6 Snow Leopard. A quick note about the screen shots: they are…
Before you sell or get rid of your computers—whether working or not—you should clean them of sensitive documents and data. To be completely safe, you should do this even…
One of the best ways to defend yourself against a Wi-Fi hacker is to learn to think like one. As a hacker, you could simply be on a quest to…
Subscribe to Cybersecurity Insider for top news, trends & analysis