A flaw was discovered in the Hilton HHonors program that could let anyone hijack all accounts.
- By Matt Holden
- Mar 24, 2015
Cyber security and cyber space technology has become one of Israel's most important exports.
Rewards start-ups for their innovation in the smart home vertical.
Causing fraudulent charges to appear on credit cards and users being locked out of accounts.
- By Ginger Hill
- Mar 19, 2015
New Jersey recently switched to digital testing, bringing a host of new security concerns with it.
- By Matt Holden
- Mar 17, 2015
Malware activated as soon as the device is plugged in; no further action required.
- By Ginger Hill
- Mar 16, 2015
The social networking site explains why it might or might not remove a piece of content reported as inappropriate or offensive.
- By Matt Holden
- Mar 16, 2015
We don’t know much yet, but Apple has shown a few features that will help keep your information safe.
- By Matt Holden
- Mar 11, 2015
There are steps anyone can take to ensure hackers will have a more difficult time accessing your system
- By Matt Holden
- Mar 10, 2015
The player accidentally swapped laptops with a principal while going through security.
- By Matt Holden
- Mar 09, 2015
A misconfigured encryption system left it vulnerable to hacking.
Cost is in the billions but only addresses a narrow range of security issues.
- By Ginger Hill
- Mar 04, 2015
The flaw leaves Apple and Android users vulnerable.
- By Matt Holden
- Mar 04, 2015
Higher education leaders are asking the state for more money to help protect universities from IT security threats.
- By Matt Holden
- Mar 03, 2015
Criminals are using the platform to buy goods with stolen identities and credit cards
- By Matt Holden
- Mar 03, 2015
When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.
- By Steven Olen
- Mar 01, 2015
Just how safe will the "Internet of Toys" be for your children?
- By Ginger Hill
- Feb 24, 2015
If cyber crime and identity theft isn't taken into consideration.
The search phrase was giving people advice for joining the radical group.
- By Matt Holden
- Feb 20, 2015
The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.
- By Matt Holden
- Feb 18, 2015