Delivers reliable, fiber-like performance via unlicensed wireless spectrum.
Intelligence agencies can intercept and decrypt communications without informing wireless network providers, foreign governments or the individual user.
- By Ginger Hill
- Feb 20, 2015
The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.
- By Matt Holden
- Feb 18, 2015
Executive actions aim to increase information sharing among private sector companies and federal law enforcement.
- By Matt Holden
- Feb 13, 2015
A line in the privacy policy states the television may record conversation and send it to a third party.
- By Matt Holden
- Feb 10, 2015
A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.
- By Matt Holden
- Feb 09, 2015
The health insurance company is working with the FBI to come to a solution.
- By Matt Holden
- Feb 05, 2015
By 2019, it is predicted that more than half a billion wearable devices will be in use each day.
- By Ginger Hill
- Feb 04, 2015
Long-trusted detection technologies increasingly ineffective says 75% of IT and security professionals in findings released by Spikes Security and Ponemon Institute.
One tech expert says biometrics are good, but there are still problems to consider.
- By Matt Holden
- Jan 29, 2015
National Data Privacy Day marked by new technology from TextPower, SnapID that verifies your identity while simplifying website logins and replaces usernames and passwords.
A case of domain hijacking determined by CyberSecurity Malaysia.
- By Ginger Hill
- Jan 26, 2015
First system able to process 2.5 billion transactions per day built for mobile economy; capable of real-time encryption for safest mobile transactions, capable of real-time analytics on transactions 17X faster than competition at a fraction of the cost.
Maybe people are becoming number to hearing about "strong, unique passwords."
- By Ginger Hill
- Jan 21, 2015
His emphasis was on protecting families, especially children.
- By Matt Holden
- Jan 21, 2015
Designed specifically for markets such as public safety, utility, inspection and construction.
The late night host was able to get passwords from strangers off the street in a skit on his show.
- By Matt Holden
- Jan 20, 2015
Ways in which Obama proposes America fights against cyber threats with commentary from Yubico CEO.
- By Ginger Hill
- Jan 14, 2015
AQE Series of PoE injectors and extractors bring data and power together.
Officials have launched an investigation into the attack
- By Matt Holden
- Jan 14, 2015