Stories by Tony Bradley

When Is a Cybercrime an Act of Cyberwar?

There is growing talk of cyberwar, as opposed to run-of-the-mill cybercrime. There are also terms that lies somewhere in the middle called cyber espionage, and cyber hacktivism--which is sort of like cyber terrorism for good guys. At the heart of the debate is an attempt to define the scope of an appropriate response to each type of threat.

Tony Bradley | 21 Feb | Read more

Microsoft Ruining Valentine's Day with Nine Security Bulletins

Next Tuesday is a big deal. Yes, <a href="http://www.pcworld.com/businesscenter/article/249664/hackers_ask_will_you_be_my_valentine.html">it is Valentine’s Day</a>, but that’s not what I’m talking about. It is also the second Tuesday in the month of February which makes it Patch Tuesday. Microsoft revealed today that there are <a href="http://technet.microsoft.com/en-us/security/bulletin/ms12-feb">nine new security bulletins</a> slated for next Tuesday -- Happy Valentine’s Day?

Tony Bradley | 10 Feb | Read more

Hackers Ask 'Will You Be My Valentine?'

There are only five days to Valentine's Day. Those of you who are shocked by that revelation are prime targets for Valentine's Day related spam and phishing attacks as hackers hope to catch you with your guard down for this day of romance.

Tony Bradley | 10 Feb | Read more

The Cloud, Day 21: My Data Might Be Safer in the Cloud

Yesterday I talked about my concerns about <a href="http://www.pcworld.com/businesscenter/article/247226/the_cloud_day_20_what_about_security.html">the security of my data</a> if I store it in the cloud. It seems like an awful lot of faith to put in a third-party to expect it to protect my data. However, there is a flip side to that coin that suggests that maybe my data is better off in their hands than mine.

Tony Bradley | 06 Jan | Read more

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of</a>.

Tony Bradley | 07 Dec | Read more

Fighting Malware and Cybercrime with Old School Criminology

It is an accepted axiom of computer and network security that the human being is the weakest link. Researchers at the University of Maryland are applying traditional criminology concepts to demonstrate that human beings may be the weakest link for the attackers as well. The insights learned may help improve computer defenses and <a href="http://www.pcworld.com/businesscenter/article/223483/mcafee_corporate_espionage_is_the_currency_of_cybercrime.html">thwart potential attacks</a>.

Tony Bradley | 30 Nov | Read more

Critical Updates Coming from Microsoft Next Week

Next Tuesday is the second Tuesday in October, and that means it is <a href="http://www.pcworld.com/businesscenter/article/239954/microsoft_adobe_unleash_flood_of_security_updates.html">Microsoft Patch Tuesday</a>. Overall, it is a moderate month in terms of patch volume, but the couple that are rated as Critical should be addressed quickly to prevent exploits.

Tony Bradley | 07 Oct | Read more

Webroot SecureAnywhere Brings Protection to the Cloud

Computer and data security is becoming a much more complex issue to manage for many businesses and consumers. Webroot hopes to simplify it, and make sure you are protected no matter what device or platform you might be using with the <a href="http://www.webroot.com/En_US/consumer-products.html">launch of SecureAnywhere</a>.

Tony Bradley | 05 Oct | Read more

McAfee Delivers Comprehensive Protection for Mobile Devices

Just when you were starting to get ahead of the curve when it comes to locking down the network and protecting PCs, everything went mobile. Not just laptops--but tablets, and smartphones that run unique operating systems and applications on completely different hardware. To help you combat the dramatic <a href="http://www.pcworld.com/businesscenter/article/229145/malware_spikes_spam_plummets_says_report.html">rise in mobile security threats</a>, McAfee has developed <a href="http://www.mcafee.com/us/products/enterprise-mobility-management.aspx">Enterprise Mobility Management</a>.

Tony Bradley | 21 Sep | Read more

WikiLeaks Leak of Its Leaks Puts Sources at Risk

It is hard not to be the center of controversy when you're a site like WikiLeaks that <a href="http://www.pcworld.com/businesscenter/article/239196/wikileaks_cable_apple_slow_to_counter_chinese_fakes.html">specializes in exposing information</a> that was never intended for the general public. The whistleblowing, freedom of the press advocate is in hot water again as it is the victim itself of a breach that exposed US State Department communications that had been leaked to it.

Tony Bradley | 03 Sep | Read more

Caution: Should You Share Your Location on Facebook?

Facebook recently rolled out a number of changes to the social networking site. One of the changes eliminates the <a href="http://www.pcworld.com/article/238708/facebook_revamps_locationsharing_feature_in_places.html">concept of Facebook Places</a>, but instead incorporates location-aware updates at virtually every level of Facebook. You might want to think twice, though, before <a href="http://www.pcworld.com/businesscenter/article/209709/facebook_deals_bring_customers_to_your_facebook_place.html">broadcasting your location</a> to the anonymous masses online.

Tony Bradley | 30 Aug | Read more

Amazon AWS GovCloud: Lessons for the Private Sector

Amazon introduced a new cloud service aimed specifically at the United States government this week. Although the <a href="http://www.pcworld.com/businesscenter/article/238276/amazon_boosts_web_services_security_for_government_agencies.html">Amazon Web Services (AWS) GovCloud</a> is targeted at government agencies, there are also some valuable lessons for private sector businesses and IT admins to learn about cloud servers and data storage.

Tony Bradley | 18 Aug | Read more

AT&T Unveils New Mobile Security Strategy

The rise of smartphones and tablets brings unprecedented mobility, but with the convenience of being able to carry and access information from virtually anywhere comes <a href="http://www.pcworld.com/businesscenter/article/237839/mobile_apps_fail_big_time_at_security_study_says.html">an increased threat</a> that attackers can also steal or access your information from virtually anywhere. AT&amp;T announced today that it is taking proactive steps to strengthen mobile security by <a href="http://www.att.com/gen/press-room?pid=20619&amp;cdvn=news&amp;newsarticleid=32381&amp;mapcode=enterprise|mk-enterprise-security">investing in a new mobile security platform</a>.

Tony Bradley | 12 Aug | Read more

Defcon for Kids Raising a New Generation of 'Hackers'

At the <a href="http://defcon.org/">Defcon conference</a> in Las Vegas last week, kids aged 8 to 16 were <a href="http://www.pcworld.com/article/231228/you_can_bring_your_kids_to_defcon.html">exposed to the world of hacking</a>. Some may fear indoctrinating a new generation of <a href="http://www.pcworld.com/businesscenter/article/230485/we_owe_lulzsec_a_thank_you.html">Anonymous and LulzSec members</a>, but young minds can expand the horizons of technology and computer security to effectively combat hacking collectives such as these.

Tony Bradley | 09 Aug | Read more