Most popular

Google in pictures

News about Google
Tutorials about Google
  • How to find out if someone has been snooping in your Gmail

    By Nick Mediati | 28 January, 2014 18:25

    Your Gmail account probably contains some sensitive information--emails from your friends and family members, information about accounts for other services, candid pictures, you name it. What if someone else has been poking around in there? Fortunately, Google gives you the tools necessary to find out.

  • Save your Internet bacon with two-factor authentication

    By Nick Mediati | 30 October, 2013 19:00

    Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.

  • Designing your digital legacy

    By David Daw | 29 April, 2013 12:53

    We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.

Features about Google
  • Security showdown 2014: And the winner is ...

    By Sarah Jacobsson Purewal | 30 January, 2014 14:19

    Free programs will take you only so far in protecting against viruses, malware, ransomware, especially now that phones and tablets are as commonly targeted as PCs. Many suites promise to protect you, but only a few offer comprehensive security with minimal hassle.

  • iOS vs. Android: Which is more secure?

    By George V. Hulme | 29 January, 2014 14:28 | 1 Comment

    With millions of new iOS and Android devices pouring into the enterprise every quarter, it's important to know just how much risk these devices bring - and if one mobile operating system has an edge over another when it comes to securing enterprise applications and data.

  • How to use the new Android remote lock option

    By Ian Paul | 25 September, 2013 07:16

    Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the ADM Website.

  • There's no free lunch when it comes to Google's Gmail

    By Sharon Gaudin | 15 August, 2013 20:52

    There's no such thing as a free email service, at least not when it comes to Google, according to industry analysts.

  • Parsing PRISM denials: Could everyone be telling the truth?

    By Mark Sullivan | 08 June, 2013 10:40

    A day after The Washington Post and Guardianpublished bombshell revelations that America's biggest tech companies are allowing the U.S. government to constantly monitor highly personal data contained in their servers, the facts remain fuzzy and somewhat fluid--and the statements of the parties involved don't add up.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Cloud Trust Authority

Reduce complexity and increase trust for public cloud service providers and their customers.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.