5 ways to spot if a website is storing your password Insecurely

Let’s face it, we use passwords for just about everything these days. That will likely change in the future, but until then, how can you be sure that the companies and websites you entrust your passwords to are storing that information securely? Well, one approach is to ask them directly how they store passwords. However […]

5 ways to evaluate a software vendor’s attitude to security… based on their “Release Notes”, “Version History” or “Change Log”

Almost every software vendor today provides a dedicated web page or a bundled text file with their software outlining the latest “Release Notes”, “Version History” or “Change Log”, and listing the new features and improvements that are included in their latest software update. Some lists are more detailed than others, but look a little closer […]

5 ways to spot a “phishing” email

“Phishing” is a term used to describe the activity of defrauding an online account holder of personal or financial information by posing as a legitimate company. The most common form of phishing on the internet is through email – you’ve almost certainly had them appear in your inbox – emails that look like they come […]