Believed to be the largest dataset ever publicly released in the United States.
- By Ginger Hill
- Mar 24, 2015
A flaw was discovered in the Hilton HHonors program that could let anyone hijack all accounts.
- By Matt Holden
- Mar 24, 2015
SuperNova Series delivers on scalability, reliability, and price.
Partnerships combines access control and security management solutions with DME.
New video solutions offer services that stream and store live and recorded video, provide flexible cloud storage and generate notification and real-time analytics.
Causing fraudulent charges to appear on credit cards and users being locked out of accounts.
- By Ginger Hill
- Mar 19, 2015
Security researchers meet to discuss tactics and strategies for exploiting security flaws in iPhones and iPads.
- By Ginger Hill
- Mar 11, 2015
We don’t know much yet, but Apple has shown a few features that will help keep your information safe.
- By Matt Holden
- Mar 11, 2015
MicroTokenization adds protection to data “around the card," adding to the newest requirement set for October 2015 EMV Standards.
The player accidentally swapped laptops with a principal while going through security.
- By Matt Holden
- Mar 09, 2015
A misconfigured encryption system left it vulnerable to hacking.
Cost is in the billions but only addresses a narrow range of security issues.
- By Ginger Hill
- Mar 04, 2015
The flaw leaves Apple and Android users vulnerable.
- By Matt Holden
- Mar 04, 2015
Higher education leaders are asking the state for more money to help protect universities from IT security threats.
- By Matt Holden
- Mar 03, 2015
Criminals are using the platform to buy goods with stolen identities and credit cards
- By Matt Holden
- Mar 03, 2015
Just how safe will the "Internet of Toys" be for your children?
- By Ginger Hill
- Feb 24, 2015
Delivers reliable, fiber-like performance via unlicensed wireless spectrum.
Intelligence agencies can intercept and decrypt communications without informing wireless network providers, foreign governments or the individual user.
- By Ginger Hill
- Feb 20, 2015
The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.
- By Matt Holden
- Feb 18, 2015
Executive actions aim to increase information sharing among private sector companies and federal law enforcement.
- By Matt Holden
- Feb 13, 2015