Expanded BT200Z smart card reader includes support for Windows 8.1. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Believed to be the largest dataset ever publicly released in the United States. 
                    
			            - By Ginger  Hill
 - Mar 24, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A flaw was discovered in the Hilton HHonors program that could let anyone hijack all accounts.
                    
			            - By Matt  Holden
 - Mar 24, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    SuperNova Series delivers on scalability, reliability, and price.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Partnerships combines access control and security management solutions with DME. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New video solutions offer services that stream and store live and recorded video, provide flexible cloud storage and generate notification and real-time analytics.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Causing fraudulent charges to appear on credit cards and users being locked out of accounts. 
                    
			            - By Ginger  Hill
 - Mar 19, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Security researchers meet to discuss tactics and strategies for exploiting security flaws in iPhones and iPads.
                    
			            - By Ginger  Hill
 - Mar 11, 2015
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    We don’t know much yet, but Apple has shown a few features that will help keep your information safe.
                    
			            - By Matt  Holden
 - Mar 11, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    MicroTokenization adds protection to data “around the card," adding to the newest requirement set for October 2015 EMV Standards.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The player accidentally swapped laptops with a principal while going through security.
                    
			            - By Matt  Holden
 - Mar 09, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A misconfigured encryption system left it vulnerable to hacking.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Cost is in the billions but only addresses a narrow range of security issues.
                    
			            - By Ginger  Hill
 - Mar 04, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The flaw leaves Apple and Android users vulnerable.
                    
			            - By Matt  Holden
 - Mar 04, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Higher education leaders are asking the state for more money to help protect universities from IT security threats.
                    
			            - By Matt  Holden
 - Mar 03, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Criminals are using the platform to buy goods with stolen identities and credit cards
                    
			            - By Matt  Holden
 - Mar 03, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Just how safe will the "Internet of Toys" be for your children? 
                    
			            - By Ginger  Hill
 - Feb 24, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Delivers reliable, fiber-like performance via unlicensed wireless spectrum. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Intelligence agencies can intercept and decrypt communications without informing wireless network providers, foreign governments or the individual user. 
                    
			            - By Ginger  Hill
 - Feb 20, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.
                    
			            - By Matt  Holden
 - Feb 18, 2015