 
                    
                                        
		            
                    It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world. 
                    
			            - By Ginger  Hill
- Oct 23, 2014
 
            
    
                
	                 
                    
                                        
		            
                    Insert USB device then tap it when prompted by Chrome. 
                    
			            - By Ginger  Hill
- Oct 21, 2014
 
            
                
	                 
                    
                                        
		            
                    Stores in the Northeastern United States may have been attacked
                    
			            - By Matt  Holden
- Oct 21, 2014
 
            
                
	                 
                    
                                        
		            
                    Learn step-by-step how to set up a Twitter account along with reasons why you should. 
                    
			            - By Ginger  Hill
- Oct 17, 2014
 
            
                
	                 
                    
                                        
		            
                    The encryption techniques might be regulated by the government in order to maintain control.
                    
			            - By Matt  Holden
- Oct 17, 2014
 
            
                
	                 
                    
                                        
		            
                    Used in encryption technology and can allow attackers to take over accounts, such as email and banking.
                    
			            - By Ginger  Hill
- Oct 16, 2014
 
            
                
	                 
                    
                                        
		            
                    Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers! 
                    
			            - By Ginger  Hill
- Oct 16, 2014
 
            
                
	                 
                    
                                        
		            
                    The company is urging users to enable two-step authentication.
                    
			            - By Matt  Holden
- Oct 15, 2014
 
            
                
	                 
                    
                                        
		            
                    The hackers are targeting the Ukrainian government, a European government agency, two European companies and a United States scholar.
                    
			            - By Matt  Holden
- Oct 14, 2014
 
            
                
	                
                    
                                        
		            
                    In honor of National Cyber Security Awareness Month, these not-so-familiar tips will help keep you safer online. 
                    
			            - By Ginger  Hill
- Oct 10, 2014
 
            
                
	                 
                    
                                        
		            
                    The court ordered Google to remove results of a man’s unflattering past.
                    
			            - By Matt  Holden
- Oct 10, 2014
 
            
                
	                 
                    
                                        
		            
                    Social media giant feels First Amendment right has been violated. 
                    
			            - By Ginger  Hill
- Oct 09, 2014
 
            
                
	                 
                    
                                        
		            
                    The security and storage company looks to split the two categories into separate organizations. 
                    
			            - By Matt  Holden
- Oct 08, 2014
 
            
                
	                 
                    
                                        
		            
                    Yahoo officials made a statement regarding a bug that was discovered by hackers looking to exploit the system. 
                    
			            - By Matt  Holden
- Oct 07, 2014
 
            
                
	                 
                    
                                        
		            
                    Many are aware of cyber security issues on a global basis, making cyber security the responsibility of everyone who interacts with the Internet in some form or fashion. 
                    
			            - By Ginger  Hill
- Oct 03, 2014
 
            
                
	                 
                    
                                        
		            
                    The attack also affected an estimated seven million businesses.
                    
			            - By Matt  Holden
- Oct 03, 2014
 
            
                
	                 
                    
                                        
		            
                    Over 200 restaurants were affected
                    
			            - By Matt  Holden
- Sep 25, 2014
 
            
                
	                 
                    
                                        
		            
                    The company says it has made it impossible in order to deflect allegations of collecting user information.
                    
			            - By Matt  Holden
- Sep 18, 2014
 
            
                
	                
                    
                                        
		            
                    The objective: to create an additional network throughout the park as a back up to aging fiber network. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Another hack in the long line of recent cyber-attacks, Home Depot’s issues showcase a bigger problem: the simplicity of the hack
                    
			            - By Matt  Holden
- Sep 10, 2014