Learn step-by-step how to set up a Twitter account along with reasons why you should.
- By Ginger Hill
- Oct 17, 2014
The encryption techniques might be regulated by the government in order to maintain control.
- By Matt Holden
- Oct 17, 2014
Used in encryption technology and can allow attackers to take over accounts, such as email and banking.
- By Ginger Hill
- Oct 16, 2014
Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!
- By Ginger Hill
- Oct 16, 2014
The company is urging users to enable two-step authentication.
- By Matt Holden
- Oct 15, 2014
The hackers are targeting the Ukrainian government, a European government agency, two European companies and a United States scholar.
- By Matt Holden
- Oct 14, 2014
In honor of National Cyber Security Awareness Month, these not-so-familiar tips will help keep you safer online.
- By Ginger Hill
- Oct 10, 2014
The court ordered Google to remove results of a man’s unflattering past.
- By Matt Holden
- Oct 10, 2014
Social media giant feels First Amendment right has been violated.
- By Ginger Hill
- Oct 09, 2014
The security and storage company looks to split the two categories into separate organizations.
- By Matt Holden
- Oct 08, 2014
Yahoo officials made a statement regarding a bug that was discovered by hackers looking to exploit the system.
- By Matt Holden
- Oct 07, 2014
Many are aware of cyber security issues on a global basis, making cyber security the responsibility of everyone who interacts with the Internet in some form or fashion.
- By Ginger Hill
- Oct 03, 2014
The attack also affected an estimated seven million businesses.
- By Matt Holden
- Oct 03, 2014
Over 200 restaurants were affected
- By Matt Holden
- Sep 25, 2014
The company says it has made it impossible in order to deflect allegations of collecting user information.
- By Matt Holden
- Sep 18, 2014
The objective: to create an additional network throughout the park as a back up to aging fiber network.
Another hack in the long line of recent cyber-attacks, Home Depot’s issues showcase a bigger problem: the simplicity of the hack
- By Matt Holden
- Sep 10, 2014
A test version of the government’s health insurance site was hacked.
- By Matt Holden
- Sep 08, 2014
Three things you can do to better protect the data on your cloud.
- By Ginger Hill
- Sep 08, 2014
Google believes Cartographer will be useful for trade shows, conferences and concerts.
- By Ginger Hill
- Sep 04, 2014