Privacy. It’s gone beyond buzzword into a class of its own: basically, privacy of the individual is of the ultimate importance, and all else must fall away in our efforts to preserve it.
- By Arie Melamed
- Apr 01, 2018
It is one of the largest cyberattacks against a major U.S. city.
- By Sydny Shepard
- Mar 30, 2018
Users are downloading their Facebook data to see just how much Facebook is recording.
- By Sydny Shepard
- Mar 27, 2018
The cyber theft campaign was targeting American universities, companies and government entities.
- By Sydny Shepard
- Mar 26, 2018
High-ranking security executives at Google, Facebook and Twitter—three of the Internet’s most important technology companies—have announced this week plans to leave their respective positions.
- By Jessica Davis
- Mar 23, 2018
The teenager ultimately decided to share his findings because he was afraid it would not be explained correctly to customers.
- By Sydny Shepard
- Mar 22, 2018
According to cybersecurity firm Kromtech, who found it stored in a publicly accessible Amazon S3 bucket.
- By Sydny Shepard
- Mar 20, 2018
Connected devices at home can record the voices, movements, weight and eating habits of those who live there. They are, in effect, very sophisticated sensors installed in the home environment. As such, they can be utilized by all sorts of people with various motivations and intentions of harming us.
- By Yotam Gutman
- Mar 19, 2018
Google released its fourth annual review for Android security. Here are the highlights.
- By Sydny Shepard
- Mar 16, 2018
According to an electronic filing, an unidentified American power company has reached a settlement to pay a $2.7 million penalty over significant security flaws that could have allowed hackers to gain remote access to their systems.
- By Jessica Davis
- Mar 15, 2018
Entities need to understand why these attacks are so common and how to combat them.
- By Dena Bauckman
- Mar 12, 2018
The new licensing program is called BlackBerry Secure and aims to protect devices with BlackBerry security technology.
The FBI gives basic steps to mitigate the threat of W-2 theft.
- By Sydny Shepard
- Mar 08, 2018
Cybersecurity was found to be the top technology used by healthcare facilities.
- By Sydny Shepard
- Mar 06, 2018
A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.
- By Sydny Shepard
- Mar 05, 2018
Due to the success of DDoS attacks, attackers are constantly evolving their techniques, so that they can target more organizations at once.
- By Robert Hamilton
- Feb 26, 2018
Experts say action must be taken to control artificial intelligence tech
- By Sydny Shepard
- Feb 22, 2018
The risk associated with progress is always great and must be considered at all times.
- By Greg Robinson
- Feb 19, 2018
The Election Security Act would provide $1 billion for the U.S. Election Assistance Commission to give to states to buy voting machines.
- By Sydny Shepard
- Feb 16, 2018
Cybersecurity firms are confirming that a computer malware attack dubbed "Olympic Destroyer" hit Wi-Fi systems at the Winter Games.
- By Sydny Shepard
- Feb 14, 2018