Cyber criminals are getting smarter about manipulating, stealing and profiting off of others’ identities.
Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.
- By Ginger Hill
- Feb 24, 2014
New ITIC/KnowBe4 Independent Survey Reveals 53% of businesses are unprepared to deal with hacked or stolen BYOD devices even though 50% indicated company-owned tablets, notebooks & smart phones may have been hacked in last 12 months.
Is your city one of the first in America to host a Bitcoin ATM?
- By Ginger Hill
- Feb 18, 2014
“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama
- By Ginger Hill
- Feb 13, 2014
“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama.
- By Ginger Hill
- Feb 12, 2014
People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.
- By Andrew Braunberg
- Feb 05, 2014
The five golden rules of developing a strong network security strategy for managing vendor access.
- By Jeff Swearingen
- Feb 04, 2014
For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.
- By Jeremy Earles
- Feb 01, 2014
The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.
A strategy for the successful management of vendor remote access.
- By Ginger Hill
- Jan 30, 2014
What to do if your statement has a charge of $9.84 followed by an unfamiliar website URL.
- By Ginger Hill
- Jan 28, 2014
Things you need to do NOW if you have recently shopped at this arts and crafts store.
- By Ginger Hill
- Jan 27, 2014
Even after closing a tab, pop-up window has the ability to record your voice, almost indefinitely, without you even knowing.
- By Ginger Hill
- Jan 22, 2014
Hey Target shoppers! Here's your special of the day to keep your shopping experience at Target out of the hands of the "bad guys."
- By Ginger Hill
- Jan 13, 2014
As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.
- By Ginger Hill
- Jan 10, 2014
Most-read articles of 2103 are about airport security, iPhones, social media, guns, TSA, Android and Homeland Security.
- By Ginger Hill
- Jan 06, 2014
For more than 20 years, biometric hand geometry systems have been providing the highest level of security, access control and convenience in a wide range of applications all over the world.
- By Emily Flink
- Dec 31, 2013
Commercial Virtual Private Networks (VPNs) are playing an increasing role in the current battle between privacy-conscious web users and government agencies seeking to increase their surveillance reach. But as online privacy becomes yet another product, ready to be branded and packaged, the problem of dishonest vendors, and a lack of education amongst customers, threatens to undermine any real benefit the market can bring.
- By Nick Pearson
- Dec 17, 2013