Things you need to do NOW if you have recently shopped at this arts and crafts store.
- By Ginger Hill
- Jan 27, 2014
Even after closing a tab, pop-up window has the ability to record your voice, almost indefinitely, without you even knowing.
- By Ginger Hill
- Jan 22, 2014
Hey Target shoppers! Here's your special of the day to keep your shopping experience at Target out of the hands of the "bad guys."
- By Ginger Hill
- Jan 13, 2014
As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.
- By Ginger Hill
- Jan 10, 2014
Most-read articles of 2103 are about airport security, iPhones, social media, guns, TSA, Android and Homeland Security.
- By Ginger Hill
- Jan 06, 2014
For more than 20 years, biometric hand geometry systems have been providing the highest level of security, access control and convenience in a wide range of applications all over the world.
- By Emily Flink
- Dec 31, 2013
Commercial Virtual Private Networks (VPNs) are playing an increasing role in the current battle between privacy-conscious web users and government agencies seeking to increase their surveillance reach. But as online privacy becomes yet another product, ready to be branded and packaged, the problem of dishonest vendors, and a lack of education amongst customers, threatens to undermine any real benefit the market can bring.
- By Nick Pearson
- Dec 17, 2013
Over the next 12 days, check back for updated safety and security tips, clever lyrics and holiday fun with Security Today as we explore the 12 Days of Christmas...security style!
- By Ginger Hill
- Dec 12, 2013
Helping you and your family stay safe while enjoying your Playstation 4 gaming journey.
- By Ginger Hill
- Dec 11, 2013
What you can do to help prevent your social media login credentials from getting stolen.
- By Ginger Hill
- Dec 04, 2013
Cybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks.
- By Márton Illés
- Dec 01, 2013
Last spring, in late March, regional grocer Schnucks Markets reported that the credit card data of more than 2 million customers was stolen by cybercriminals.
- By Jason Mical
- Dec 01, 2013
Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.
- By Charles P. Williams
- Dec 01, 2013
Kevin Kolbye, as assistant special agent in charge of the FBI’s Dallas office, spoke about the FBI’s counterterrorism efforts.
- By Jamie Friedlander
- Nov 21, 2013
Solutions that generate crypto keys may be the answer.
- By Dave Anderson
- Nov 14, 2013
Grab your cup of coffee, and take 5 minutes to make sure you stay safe online!
- By Ginger Hill
- Nov 08, 2013
The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount.
- By Mark Steffler
- Nov 01, 2013
Grant valued at more than $1.5 million is one of four being awarded this year through the National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative.
A world saturated with digital data needs assurance that this data won't fall into the wrong hands.
- By Ginger Hill
- Oct 17, 2013