Same malware used in Target attack also targeted more than a thousand other U.S. businesses.
- By Ginger Hill
- Aug 22, 2014
The shipping company found that 51 stores have been hacked
- By Matt Holden
- Aug 22, 2014
Companies called out for jeopardizing the security and privacy of their users.
- By Ginger Hill
- Aug 20, 2014
Community Health Systems in Central Florida hospitals are affected by the breach
- By Matt Holden
- Aug 20, 2014
Internal investigation reveals three breaches in past three years, twice foreign related and once unidentifiable.
- By Ginger Hill
- Aug 19, 2014
The product can be used on Windows, OS X, Android, and iOS
Almost half of consumers would never use mobile payment and banking apps due to fears about the level of security on their devices, with suspicions highest in the over 55 age group.
Movie quotes offer great insights and knowledge to enhance the security industry.
- By Ginger Hill
- Aug 13, 2014
- By Matt Holden
- Aug 12, 2014
Two researchers planned to reveal their findings at Black Hat USA.
- By Matt Holden
- Aug 08, 2014
Breakthrough encryption and tokenization technologies deliver a new level of safety in today’s risk-prone, online transactional world.
The company says it has all the markings of a state-sponsored attack.
- By Matt Holden
- Aug 07, 2014
4 ways to battle this social media giant to beat them at their own game.
- By Ginger Hill
- Aug 06, 2014
Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.
- By Matt Holden
- Aug 06, 2014
The internet company found illegal images in his Gmail account.
- By Matt Holden
- Aug 05, 2014
In wake of recent bombings, activist group feels need to hack.
- By Ginger Hill
- Aug 05, 2014
While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits.
- By Phil Scarfo
- Aug 01, 2014
Questions still remain about the implementation and effectiveness of this rule.
- By Matt Holden
- Jul 25, 2014
Typewriter sales in German economy boom as tool to thwart cyber spying.
- By Ginger Hill
- Jul 25, 2014
Cybersecurity researcher exploits home security for the sake of safety.
- By Matt Holden
- Jul 24, 2014