The annual Consumer Electronics Show had many security companies showing off their latest innovations.
Vehicle attacks, hacks and police ambushes make the list of top physical security events of 2016.
Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.
- By Isaac Kohen
- Dec 28, 2016
There is a growing belief that 2017 will be a decisive year in the battle over encryption that has been quietly raging for over 25 years.
- By Mike Salas
- Dec 27, 2016
Yahoo said 1 billion accounts were affected in the 2013 hack.
Quest Diagnostics' mobile application was hacked leaving the health information of about 34,000 people vulnerable.
Several routers, including those in the popular “Nighthawk” series, are affected.
Exploring basic best practices for securing documents on your computer and smartphone
- By Cole Armstrong
- Dec 13, 2016
Facebook, YouTube, Twitter and Microsoft are collaborating to crackdown on terrorist content on their platforms.
Close the door on Locky ransomware infection via Facebook
- By David Biser
- Dec 02, 2016
Leveraging artificial intelligence and machine learning allows organizations to enjoy real time protection and risk identification, significantly reducing security risks without the need to increase staff.
- By Santosh Varughese
- Sep 23, 2016
A U.S. House committee issued a scathing report accusing Snowden of causing damage to U.S. security.
The top iPhone features that guard your privacy and security.
Each of these four key components are essential in establishing a solid defense against would-be cyber-attacks.
- By Gabby Nizri
- Jun 29, 2016
Intel could never make full use of the McAfee business, which it bought in 2010.
- By Sydny Shepard
- Jun 27, 2016
DDoS attack prevention is nearly impossible: it’s difficult to track down hackers, whereas it’s easy and inexpensive to launch a DDoS attack.
- By Dave Larson
- Jun 24, 2016
Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.
- By Sydny Shepard
- Jun 23, 2016
A security firm analyzed open security cameras and concluded which U.S. cities have the most unsecured cameras in use.
- By Sydny Shepard
- Jun 22, 2016
Acer has admitted to a data breach that affects more than 30,000 customers.
- By Sydny Shepard
- Jun 20, 2016
While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.
- By Eric Aarrestad
- Jun 20, 2016