When you print, scan, or copy anything at home or in the office, the data on the printed page makes it possible to track both you and your documents.
The company quickly resolved the problem in its Xfinity customer software.
- By Sydny Shepard
- Aug 10, 2018
Homeland Security has created a new command to help aid the U.S. in cybersecurity efforts.
- By Sydny Shepard
- Aug 03, 2018
A bad actor was able to gain access to Reddit's systems through intercepting the two-factor SMS verification system.
- By Sydny Shepard
- Aug 02, 2018
A service known to protect the identities of users is now realizing it might have made its users vulnerable to attack.
- By Sydny Shepard
- Jul 27, 2018
A Bluetooth vulnerability has the potential to allow a nearby hacker to gain unauthorized access to a device.
- By Sydny Shepard
- Jul 26, 2018
Google employees have successfully dodged phishing attempts for over a year thanks security keys and two-factor authentication.
- By Sydny Shepard
- Jul 25, 2018
Spear phishing is a targeted type of phishing in which the scammer already knows some information about the victim.
Global research company CrowdStrike surveyed over a thousand IT decision-makers and found companies awarness to combat supply chain attacks.
- By Sydny Shepard
- Jul 23, 2018
The question is this: How can healthcare organizations protect themselves against threats when most originate from within their own walls?
- By Hoala Greevy
- Jul 20, 2018
Millions of personal data records are vulnerable after a breach was detected at LabCorp.
- By Sydny Shepard
- Jul 19, 2018
IBM Security and Ponemon Institute have released their study on the average cost of a data breach.
- By Sydny Shepard
- Jul 17, 2018
Even if you don’t have a Facebook account, you have undoubtedly heard the reports about how Cambridge Analytica accessed the personally identifiable information (PII) of up to 87 million users over a period of several years.
- By Christian Morin
- Jul 11, 2018
As with all major sporting and entertainment events, the goal is for everyone using a ticket to have purchased it from the authorized ticketing entity and to have a seamless experience both when they pick it up and when they present it at the venue.
- By Cesare Paciello
- Jul 11, 2018
Our goal of clustering attacks on web applications is two-fold
- By Gilad Yehudai
- Jul 11, 2018
Timehop disclosed a security breach that has compromised the personal data, including names and emails, of its 21 million users
- By Sydny Shepard
- Jul 10, 2018
Information Security it is one of the most in demand skill sets in all the technology industry.
- By Anthony Coggine
- Jul 06, 2018
This new AI could present new challenges as well as opportunities
- By Harold Kilpatrick
- Jun 29, 2018
\Wi-Fi Alliance is looking to beef up security with an updated protocol
- By Sydny Shepard
- Jun 27, 2018
Google has announced it has overhauled it's privacy and security settings service
- By Sydny Shepard
- Jun 26, 2018