The teenager ultimately decided to share his findings because he was afraid it would not be explained correctly to customers.
- By Sydny Shepard
- Mar 22, 2018
According to cybersecurity firm Kromtech, who found it stored in a publicly accessible Amazon S3 bucket.
- By Sydny Shepard
- Mar 20, 2018
Google released its fourth annual review for Android security. Here are the highlights.
- By Sydny Shepard
- Mar 16, 2018
According to an electronic filing, an unidentified American power company has reached a settlement to pay a $2.7 million penalty over significant security flaws that could have allowed hackers to gain remote access to their systems.
- By Jessica Davis
- Mar 15, 2018
Entities need to understand why these attacks are so common and how to combat them.
- By Dena Bauckman
- Mar 12, 2018
The FBI gives basic steps to mitigate the threat of W-2 theft.
- By Sydny Shepard
- Mar 08, 2018
The European Union will begin to enforce strict data security starting in May. Here's what you should know.
- By Sydny Shepard
- Mar 07, 2018
Cybersecurity was found to be the top technology used by healthcare facilities.
- By Sydny Shepard
- Mar 06, 2018
A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.
- By Sydny Shepard
- Mar 05, 2018
Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.
- By Mark Clifton
- Mar 01, 2018
The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.
- By Courtney Dillon Pedersen
- Mar 01, 2018
E-passports store a cryptographic signature to prevent forgeries and tampering, but CBP has not deployed the software needed to verify the information, causing a security lapse.
- By Jessica Davis
- Feb 27, 2018
Due to the success of DDoS attacks, attackers are constantly evolving their techniques, so that they can target more organizations at once.
- By Robert Hamilton
- Feb 26, 2018
Cryptojacking is the act of poisoning a website to get a computer to mine cryptocurrencies unknowingly. Here's what you can do to prevent it.
- By Sydny Shepard
- Feb 23, 2018
Experts say action must be taken to control artificial intelligence tech
- By Sydny Shepard
- Feb 22, 2018
The risk associated with progress is always great and must be considered at all times.
- By Greg Robinson
- Feb 19, 2018
Cybersecurity firms are confirming that a computer malware attack dubbed "Olympic Destroyer" hit Wi-Fi systems at the Winter Games.
- By Sydny Shepard
- Feb 14, 2018
Washington state’s new cannabis-tracking system was hacked the weekend of Feb. 3, according to the Washington State Liquor and Cannabis Board (WSLCB). Among other information, the hacker stole route information associated with four days of marijuana deliveries.
- By Jessica Davis
- Feb 12, 2018
Relatively new on the market, the iKeyp is a smart safe for everyday use. It is simple to install and easy to connect with via the app on your smartphone.
- By Ralph C. Jensen
- Feb 12, 2018
Beginning in July with the release of Chrome 68, Google Chrome will mark all HTTP sites as “not secure”. The Chrome browser already displays a green lock icon and “Secure” sign in the URL bar for HTTPS-encrypted websites.
- By Jessica Davis
- Feb 12, 2018