Fight against online threats and cyber-crime continues.

This week we were surprised to find a few articles that indicate large companies in the IT industry make their best to develop new authentication ways and get rid of the old password method. Should they make it? Time will tell.

Our security blog brought this week 2 important articles for your online security. The first is an essential security assessment checklist that you can read to verify your online security knowledge and the second article reaches a subject we are all interested in: How to choose the best antivirus for your PC.

Our goal is to bring you the latest security news from the digital world. And this is what we do.

These are the 10 security articles of the week that you should read in order to improve your online security.


Security articles of the week



 1. Yahoo says goodbye to passwords. Is it a good idea?

Yahoo disclosed a new login procedure where users don’t need to use passwords anymore. Since a strong password is difficult to remember, why don’t we drop this option, they seem to say. But is it normal to depend so much on our mobile phones? What if we travel and need to access other networks or we lose our phones?


2. New Technology Lets You Make Payments Simply By Looking At Your Phone, But Is It Safe?

A new technology is under development to allow people make online payments by using facial recognition. This is yet another example of a company that looks for ways to remove the weak passwords from the online chain, but is this really possible?


3. Windows 10 says “Hello” to logging in with your face and the end of passwords

It seems everybody is looking these days for a way to make passwords disappear. Microsoft is now developing the technology for Windows 10 users to log in using their faces or the iris recognition. So, should we expect to see passwords gone in just a few years?


4. Mistakes the Good Guys Make During a Hack Attack

We place such a great emphasize on the prevention stage of a computer hack that sometimes we neglect another stage, which sometimes we need to face: What is to be done when the data breach occurs and hackers passed our defenses?



Dark Web is a small part of the Deep Web, but it is a place quite interesting and dangerous. Hidden from official control, a lot of suspicious activities take place here, from buying drugs and human organs to hiring hitmen for dirty works. Not to mention cyber-criminals that sell malicious software anyone can purchase to lead a life of crime.


6. A map of all the underwater cables that connect the internet

Has the world really changed that much? This article shows us a nice vintage map of the world and the underwater cables on the seafloor that transmit about 99 percent of international data. You can even look back at 1912 and see the past trade routes at that time. Apparently, things don’t change that much, only the means.


7. Signature antivirus’ dirty little secret

A good article that proves we need more than an antivirus solution to keep our systems protected. The antivirus is just an addition to our layered security strategy. Read to learn.


8. China Reveals Its Cyberwar Secrets

China finally comes forward and admits they have special forces that can wage online attacks and cybernetic wars on computer networks. But, is this a surprise? Everybody knows US, China and Russia have the most sophisticated cyber warfare forces.


9. 6 notorious hackers and their second careers

What is like to be a hacker? Can there be a real life for such people? Fortune brings an interesting article that indicates how infamous hackers became adults with normal lives and normal legal jobs.


10. Your Credit Report And Identity Theft: What You May Not Know

Identity theft is connected to our credit card information, to the way we use our credentials to make online payments and how we keep it safe online. If you are running commercial transactions, you need to read this article.


We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?

This post was originally published by Aurelian Neagu in March 2015.

Leave a Reply

Your email address will not be published. Required fields are marked *