- Core IT
- Business & Money
- Personal Tech
Member since: February 2012
Bio: Tony Bradley is Founder and President of S3KUR3, Inc., providing expertise and written content on a variety of technology subjects, ranging from social networking to mobile devices to information security. Tony is the writer behind the PCWorld Net Work blog and print column, author / co-author of a dozen IT books, and frequent contributor of content for PCWorld, and other online media sources. Tony has been a CISSP (Certified Information Systems Security Professional) for nearly 9 years, and has been awarded the prestigious Microsoft MVP designation for 6 straight years.
- F-Secure's latest Threat Report highlights concerns that the force behind CryptoLocker ransomware was disabled but not destroyed.
2 weeks 2 days ago
- A new survey from Kaspersky Lab shows some concerning trends when it comes to securing and protecting business data on mobile devices.
2 weeks 4 days ago
- Microsoft is late to a game already owned by iOS and Android, but affordable Windows tablets could shift things in Microsoft's favor.
3 weeks 2 days ago
- A new survey from Kaspersky finds that many IT professionals don't understand the security threats against virtual servers.
7 weeks 6 days ago
- The IRS says it lost or destroyed emails pertinent to an ongoing investigation--but if procedure was followed, that shouldn't be possible.
8 weeks 5 days ago
- I wrote yesterday about a report from Microsoft researchers, which goes against established password security best practices. The new guidance from the Microsoft researchers makes sense to me, because it fits how I handle password management already. However, at least one security expert feels that there is a fatal flaw that makes the new password advice impractical: You.
9 weeks 2 days ago
- New guidance from Microsoft researchers suggests that users re-use simple passwords and avoid password management services.
9 weeks 3 days ago
- Microsoft has fixed 83 flaws in its browser in the last two months.
10 weeks 5 days ago
- Both Microsoft and Google have recently beefed up their storage options. Here's how to decide which on is right for you.
12 weeks 3 days ago
- tonys3kur3 wrote What data breaches teach us about the future of malware: Your own data could dupe youThe most concerning security trend can't be remedied by patching and updating applications or thwarted by your security software.
14 weeks 6 days ago
- Though XSS vulnerabilities are common, there are tools and techniques available to test for them so they can be resolved before the code is used on a live website.
16 weeks 3 days ago
- Office Mobile (of course), OneNote, Skype, Yammer and more have iPhone apps that can help you keep working.
16 weeks 4 days ago
- Attackers are planting fake antimalware apps in popular mobile app stores, but they're not hard to spot if you know what to look for.
18 weeks 2 days ago
- They don't back up the same way. Choose carefully to save the data that matters most to you.
18 weeks 3 days ago
- Phishers typically use spam email to try and lure victims, but Kaspersky says the new trend is exploiting users' love of gadgets.
19 weeks 4 days ago
- We recently passed an Internet milestone: April 12 marked the 20-year anniversary of commercialized spam. But even with two decades and trillions of unsolicited messages behind us, it seems there is still no end in sight.
21 weeks 6 days ago
- Twitter announced that it is putting its MoPub acquisition to use by enabling Twitter marketers to promote and distribute mobile apps. There is a potential opportunity there, though, for attackers to exploit the system if users become conditioned to download apps from their Twitter feed without thinking.
22 weeks 2 days ago
- Everything's been hacked! Change all your passwords but not yet! Security experts cut through the Heartbleed hype.
22 weeks 3 days ago
- HP's 2013 Cyber Risk Report found most security risks result from configuration errors rather than flaws in the application itself.
23 weeks 2 days ago
- By now you've likely heard about the Heartbleed bug, a critical vulnerability that exposes potentially millions of passwords to attack and undermines the very security of the Internet. Because the flaw exists in OpenSSL--which is an open source implementation of SSL encryption--many will question whether the nature of open source development is in some way at fault. I touched based with security experts to get their thoughts.
23 weeks 4 days ago
- What's the worst that could happen when Microsoft ends Windows XP support? Do you really want to find out?
24 weeks 2 days ago
- The competing suites square off over features, file compatibility and ease of use.
24 weeks 6 days ago
- Evernote is more than a digital notepad. Try these tools to see how versatile it can be.
27 weeks 3 days ago
- Despite all of the attention it has received in the media, government hacking ranks low as a concern for security professionals.
28 weeks 3 days ago
- Java's prevalence on devices and lax defenses make it a favorite target of malware developers.
28 weeks 4 days ago
- 1 of 8
Follow other ITworld members or sign in with your Facebook account in order to view your friends' activity.