What it all boils down to is internal vs. external cyber communications.
- By Ginger Hill
- Jun 18, 2014
Integrated with the smartphone's firmware, it is impossible to remove or disable the malicious app.
- By Ginger Hill
- Jun 18, 2014
As unregulated virtual currencies make their way back into iOS devices, what type of security issues will develop?
- By Ginger Hill
- Jun 16, 2014
Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.
- By Ginger Hill
- Jun 12, 2014
How three security professionals in the education vertical are keeping their campuses safe and secure for all.
- By Ginger Hill
- Jun 11, 2014
Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
- By Ginger Hill
- Jun 11, 2014
Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?
- By Ginger Hill
- Jun 10, 2014
Parents of school children are standing up against Big Data when it comes to their children's personal information.
- By Ginger Hill
- Jun 09, 2014
Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.
- By Ginger Hill
- Jun 05, 2014
China's People's Daily, a state-operated media outlet, promises punishments as translated by Reuters.
- By Ginger Hill
- Jun 04, 2014
Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.
- By Ginger Hill
- Jun 04, 2014
Charges flied in Pennsylvania, marking the first time criminal charges have been filed against known state actors for hacking.
- By Ralph C. Jensen
- May 30, 2014
Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.
- By Sara Gates
- May 30, 2014
Long-winded privacy policies create confusion and frustration for Internet consumers.
- By Ginger Hill
- May 22, 2014
eBay officials urging all 112 million users to change their passwords immediately to help rectify recently-discovered breach.
- By Ginger Hill
- May 21, 2014
Law enforcement officials from around the globe ban together in hopes of at least putting a dent into this global threat.
- By Ginger Hill
- May 19, 2014
Engaging on Twitter leads to discover of app to help parents keep their children safe via open communication and allowing the child to be an advocate for their own safety.
- By Ginger Hill
- May 01, 2014
ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.
- By Ralph C. Jensen
- May 01, 2014
Heartbleed scanner identifies over 1,700 vulnerable mobile apps.
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014