Cybereye

CyberEye

  • Phishing expedition

    Spear-phishing scourge: It's up to you, the user

    Browsers are getting better at blocking phishing sites, but phishers are getting more nimble at keeping their sites on the move.

    Comments: 1
  • Mobile apps

    Mobile devices show low rate of malware infections

    Despite the growing number of malicious apps for Android devices, researchers at Georgia Tech found a surprisingly low rate of infections on phones in the United States.

  • Starting line

    Still at the starting line in the cyberdefense race

    DOD wants a baseline of security standards for defending civilian critical infrastructure and clear lines of authority for sharing information across sector boundaries.

  • Free apps

    Security gets short shrift in mobile apps

    A lack of attention from developers and users to the security of mobile applications has troubling implications for those who would bring mobile devices into the workplace.

    Comments: 1
  • International flags

    Putting cybersecurity on the diplomatic agenda

    The EastWest Institute is holding its third cybersecurity summit in India next week, part of an effort to bring nations together in this strange new world called cyberspace.

    Comments: 1
  • Voting machine

    Securing voting machines is only half the battle

    With the growing use of electronics in voting systems, the security of network connections are increasingly important, and sometimes overlooked.

    Comments: 1
  • Information sharing

    Why cyber defense tech is not working

    The nation's cybersecurity is still hampered by inadequate cooperation between the public and private sectors; legislation could help solve that problem.

    Comments: 1
  • URL shortener

    When even .gov sites lead you down the wrong path

    The recent exploit of open redirect in some shortened .gov Web addresses underscores the importance of server configuration to guard against easily prevented problems.

  • Cyberspace

    Obama, Romney give lip service to cybersecurity

    Despite the critical role played by IT in both the economy and national security, the need to protect online assets gets little attention from candidates.

  • Retired couple

    Want secure BYOD? Hire only rich retirees

    A recent survey on password use suggests that the more established and stable you are, the more likely you are to use a strong password.