 
                    
                                        
		            
                    The company says it has all the markings of a state-sponsored attack.
                    
			            - By Matt  Holden
- Aug 07, 2014
 
            
    
                
	                 
                    
                                        
		            
                    4 ways to battle this social media giant to beat them at their own game.
                    
			            - By Ginger  Hill
- Aug 06, 2014
 
            
                
	                 
                    
                                        
		            
                    Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.
                    
			            - By Matt  Holden
- Aug 06, 2014
 
            
                
	                 
                    
                                        
		            
                    The internet company found illegal images in his Gmail account.
                    
			            - By Matt  Holden
- Aug 05, 2014
 
            
                
	                 
                    
                                        
		            
                    In wake of recent bombings, activist group feels need to hack. 
                    
			            - By Ginger  Hill
- Aug 05, 2014
 
            
                
	                 
                    
                                        
		            
                    While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits. 
                    
			            - By Phil   Scarfo
- Aug 01, 2014
 
            
                
	                 
                    
                                        
		            
                    Questions still remain about the implementation and effectiveness of this rule.
                    
			            - By Matt  Holden
- Jul 25, 2014
 
            
                
	                 
                    
                                        
		            
                    Typewriter sales in German economy boom as tool to thwart cyber spying.
                    
			            - By Ginger  Hill
- Jul 25, 2014
 
            
                
	                 
                    
                                        
		            
                    Cybersecurity researcher exploits home security for the sake of safety.
                    
			            - By Matt  Holden
- Jul 24, 2014
 
            
                
	                 
                    
                                        
		            
                    Authorities to announce the who they arrested and the number people victimized.
                    
			            - By Matt  Holden
- Jul 23, 2014
 
            
                
	                 
                    
                                        
		            
                    Search engine offers way to look up login credentials from over 100 hacks, but what's the catch?
                    
			            - By Ginger  Hill
- Jul 21, 2014
 
            
                
	                 
                    
                                        
		            
                    State’s department of financial services unveiled a set of draft rules for “BitLicenses,” which apply for all virtual currencies. 
                    
			            - By Matt  Holden
- Jul 18, 2014
 
            
                
	                 
                    
                                        
		            
                    Microsoft will follow in Google’s footsteps and allow users to block search results for their name. 
                    
			            - By Matt  Holden
- Jul 18, 2014
 
            
                
	                 
                    
                                        
		            
                    With sophisticated technology comes risk if you are not vigilant in applying security updates. 
                    
			            - By Ginger  Hill
- Jul 16, 2014
 
            
                
	                 
                    
                                        
		            
                    Apple customers warned to be aware of security risks on their iPhones.
                    
			            - By Matt  Holden
- Jul 14, 2014
 
            
                
	                 
                    
                                        
		            
                    6 steps on predicting the future of your network's security: process, enhance, cross-correlate, baseline and analyze information. 
                    
			            - By Benjamin  Powell
- Jul 14, 2014
 
            
                
	                 
                    
                                        
		            
                    Petition floating around Facebook supporting Lewis Alberto Suarez Diaz (the biter) scamming people out of their personal data. 
                    
			            - By Ginger  Hill
- Jul 11, 2014
 
            
                
	                 
                    
                                        
		            
                    Complete with an example of a strong, unique password with a surprise at the end, this is a must-read!
                    
			            - By Ginger  Hill
- Jul 10, 2014
 
            
                
	                 
                    
                                        
		            
                    Consortium hopes to establish common ground for connection by developing framework for manufacturers. 
                    
			            - By Matt  Holden
- Jul 08, 2014
 
            
                
	                 
                    
                                        
		            
                    In theory, IoT is a great concept; it all boils down to ease of use vs security. Which is more important? 
                    
			            - By Allan  Pratt
- Jul 01, 2014