Blog Posts Tagged with "infographic"

37d5f81e2277051bc17116221040d51c

Are Your Mobile Apps Up To No Good?

September 06, 2012 Added by:Robert Siciliano

Why would an app to monitor your battery need to know your location via your GPS? How come gaming apps ask users for their phone numbers? Mobile applications, especially free ones, require your personal data to supplement development costs. This means “free” isn’t exactly free...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Stuxnet: The New Face of 21st Century Cyber Warfare

August 23, 2012 Added by:Fergal Glynn

In June of 2010 the Stuxnet worm made it’s debut. Joint engineered by the United States and Israel to cripple Iran’s nuclear efforts, it wasn’t long before the worm was altered and turned loose on the internet spawning a number of variations of the original worm and affecting computers around the world...

Comments  (1)

9f19bdb2d175ba86949c352b0cb85572

Infographic: The Social Media Side of Incident Response...

August 13, 2012 Added by:Neira Jones

It seems that my previous post on the social media side of incident response attracted some attention and I thank everyone for their feedback. This prompted me to explore the brave new world of infographics... So here we go, my first foray into what is for me uncharted territory...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Risks from a Lost or Stolen Mobile Device

August 13, 2012 Added by:Robert Siciliano

Mobile devices are on the move, meaning they can more easily be lost or stolen and their screens and keyboards are easier targets for “over the shoulder” browsing. When we lose our phones, we think about the pain and cost of replacing the device. But that’s just the tip of the iceberg...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Small Business Cyber Security: An Infographic

July 02, 2012 Added by:Fergal Glynn

Businesses often assume they are safe from cyber attacks because they are too small to be of interest to hackers, or mistakenly assume they have taken adequate measures to protect themselves. This infographic highlights the risks faced by small businesses and gives a few tips to help safeguard against attacks...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Building Secure Web Applications: An Infographic

June 14, 2012 Added by:Fergal Glynn

Neglecting to take security measures at the application layer is one of the most common causes of data breaches, yet many companies still leave their applications unprotected. Securing applications begins with developer training on the risks applications face and methods required for vulnerability prevention...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

How Mobile Apps are Invading Your Privacy: An Infographic

June 08, 2012 Added by:Fergal Glynn

With millions of mobile apps receiving billions of downloads, it is important that users are aware of the risks they face when downloading and using apps. This infographic uses real world cases to outline the threat to user privacy posed by mobile apps...

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

ISO 22301 and BS 25999-2: Similarities and Differences Infographic

May 29, 2012 Added by:Dejan Kosutic

A new business continuity standard (ISO 22301) was published very recently, so in this infographic you'll find a comparison of this new standard with the old BS 25999-2 standard plus ways you can learn more about ISO 22301...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Cybersecurity Risks in Public Companies: An Infographic

May 07, 2012 Added by:Fergal Glynn

Following new SEC guidance issued relating to disclosure of security risks in company filings, public companies are beginning to be measured by regulators and investors on the strength of their security solution and ability to protect intellectual property and customer data...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

Mobile Security: Android vs. iOS - An Infographic

January 12, 2012 Added by:Fergal Glynn

With the dominance of iOS and the rising popularity of Android devices in the mobile marketplace, the security of these devices is a growing concern. This infographic examines the security features of Android and iOS, and also takes a look at their strengths and weaknesses...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

The History of Computer Malware: An Infographic

November 01, 2011 Added by:Dan Dieterle

Received this infographic that traces the history of computer viruses from our friends at Bitdefender and thought we would pass it along. Hope you enjoy it...

Comments  (0)