Fight against online threats and cyber-crime continues.

The most interesting articles this week revolve around Twitter and its growing implication in the war on terror, the silent action of closing around 2,000 terrorist accounts and the expected terrorist threats. Should social media and the online be involved in war? Hard to tell.

Our security blog provided this week – probably for the first time – 3 important articles for your online security. One comes from our new colleague, Andra Zaharia, who provides 5 valuable tips to protect your parents from cyber attacks, one comes from our CEO, Morten Kjaersgaard, who reveals the way hackers use software exploits to deliver cyber-attacks and the third article provides a comprehensive list of malware and security forums where you can get assistance in case of malware infection.

Our goal is to bring you the latest security news from the digital world. And this is what we do.

These are the 10 security articles of the week that you should read in order to improve your online security.

Security articles of the week

1. New Report Maps ISIS Support on Twitter

Recent years revealed an increasing usage of social media networks in terrorist activities and real war strategies. This week we noticed how Twitter closed about 2,000 ISIS accounts that were spreading the terrorist organization’s messages to the world. What’s next?

2. 5 Things You Didn’t Know About Using Personal Email at Work

How do we keep the distance or the balance between work and our private life? Should we? Read the article and learn how to keep your work communication strictly work related.

3. Technology is not to blame for online attacks: FireEye

Though online attacks against organizations may have increased lately, we should not blame technology, but people that use technology to create online dangers for organizations.

4. 2014 a record year for malware, says security firm

It’s no secret that last year was a disaster for security, especially the massive data breaches we witnessed. Now, Panda Security tells us that the number of malware attacks and privacy breaches have doubled in comparison to 2013.

5. Firewall: The king of network security

Who said firewall is dead? This survey from over 700 network security practitioners reveals that firewalls are still important for our online security strategy. So, keep it up and stay safe!

6. DNS enhancement catches malware sites by understanding sneaky domain names

They say security can’t keep up with cyber-criminals. But here we have a new security service, OpenDNS, that isn’t relying only on the reputation analysis to detect and block malicious domains, but it also takes a look beyond to analyze the domain name itself for proofs of sketchiness.

7. China defends cybersecurity demands, amid complaints from US

The cyber war between the two great powers continues by China imposing rules and regulations to the American companies that conduct activities on Chinese soil, an element which is noticed immediately. What is actually at stake?

8. Wireless Charging: A Surprising New Way To Track You

This article tells us that wireless charging is actually not that safe, since there are some connection details that you leave behind in the place you connect. So, it may look like an innocent coffee shop, but it may already know who you are and what you like.

9. A Brief History of Apple Hacking

The MACs or generally speaking the Apple products can’t be broken. Is this myth still alive? Maybe we should take a look at this short history of Apple hacking and remember that no one is safe from security breaches.

10. Expert tips to address third party security risks

Third party security risks are a real danger for corporations and with the increasing usage of sensitive information, cyber attacks and data breaches, we need new security strategies and best practices to stay safe. This article gives us the necessary steps to do that.


We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?

This post was originally published by Aurelian Neagu in March 2015.

Leave a Reply

Your email address will not be published. Required fields are marked *