The social networking site explains why it might or might not remove a piece of content reported as inappropriate or offensive.
- By Matt Holden
- Mar 16, 2015
We don’t know much yet, but Apple has shown a few features that will help keep your information safe.
- By Matt Holden
- Mar 11, 2015
There are steps anyone can take to ensure hackers will have a more difficult time accessing your system
- By Matt Holden
- Mar 10, 2015
The player accidentally swapped laptops with a principal while going through security.
- By Matt Holden
- Mar 09, 2015
A misconfigured encryption system left it vulnerable to hacking.
Cost is in the billions but only addresses a narrow range of security issues.
- By Ginger Hill
- Mar 04, 2015
The flaw leaves Apple and Android users vulnerable.
- By Matt Holden
- Mar 04, 2015
Higher education leaders are asking the state for more money to help protect universities from IT security threats.
- By Matt Holden
- Mar 03, 2015
Criminals are using the platform to buy goods with stolen identities and credit cards
- By Matt Holden
- Mar 03, 2015
When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.
- By Steven Olen
- Mar 01, 2015
Just how safe will the "Internet of Toys" be for your children?
- By Ginger Hill
- Feb 24, 2015
If cyber crime and identity theft isn't taken into consideration.
The search phrase was giving people advice for joining the radical group.
- By Matt Holden
- Feb 20, 2015
The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.
- By Matt Holden
- Feb 18, 2015
Cloud-based service loads applications into the cryptographically-secured Trusted Execution Environment, embedded in the majority of leading Android smartphones.
KnowBe4 urges US institutions to take effective action to train employees before they fall victim to phishing attacks.
Executive actions aim to increase information sharing among private sector companies and federal law enforcement.
- By Matt Holden
- Feb 13, 2015
A line in the privacy policy states the television may record conversation and send it to a third party.
- By Matt Holden
- Feb 10, 2015
A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.
- By Matt Holden
- Feb 09, 2015
The President’s second, and final, national security strategy focuses on limiting how much the United States can shape world events.
- By Matt Holden
- Feb 06, 2015