Causing fraudulent charges to appear on credit cards and users being locked out of accounts.
- By Ginger Hill
- Mar 19, 2015
New Jersey recently switched to digital testing, bringing a host of new security concerns with it.
- By Matt Holden
- Mar 17, 2015
Malware activated as soon as the device is plugged in; no further action required.
- By Ginger Hill
- Mar 16, 2015
The social networking site explains why it might or might not remove a piece of content reported as inappropriate or offensive.
- By Matt Holden
- Mar 16, 2015
We don’t know much yet, but Apple has shown a few features that will help keep your information safe.
- By Matt Holden
- Mar 11, 2015
There are steps anyone can take to ensure hackers will have a more difficult time accessing your system
- By Matt Holden
- Mar 10, 2015
The player accidentally swapped laptops with a principal while going through security.
- By Matt Holden
- Mar 09, 2015
A misconfigured encryption system left it vulnerable to hacking.
Cost is in the billions but only addresses a narrow range of security issues.
- By Ginger Hill
- Mar 04, 2015
The flaw leaves Apple and Android users vulnerable.
- By Matt Holden
- Mar 04, 2015
Higher education leaders are asking the state for more money to help protect universities from IT security threats.
- By Matt Holden
- Mar 03, 2015
Criminals are using the platform to buy goods with stolen identities and credit cards
- By Matt Holden
- Mar 03, 2015
When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.
- By Steven Olen
- Mar 01, 2015
Just how safe will the "Internet of Toys" be for your children?
- By Ginger Hill
- Feb 24, 2015
If cyber crime and identity theft isn't taken into consideration.
The search phrase was giving people advice for joining the radical group.
- By Matt Holden
- Feb 20, 2015
The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.
- By Matt Holden
- Feb 18, 2015
Cloud-based service loads applications into the cryptographically-secured Trusted Execution Environment, embedded in the majority of leading Android smartphones.
KnowBe4 urges US institutions to take effective action to train employees before they fall victim to phishing attacks.
Executive actions aim to increase information sharing among private sector companies and federal law enforcement.
- By Matt Holden
- Feb 13, 2015