Cost is in the billions but only addresses a narrow range of security issues.
- By Ginger Hill
- Mar 04, 2015
The flaw leaves Apple and Android users vulnerable.
- By Matt Holden
- Mar 04, 2015
Higher education leaders are asking the state for more money to help protect universities from IT security threats.
- By Matt Holden
- Mar 03, 2015
Criminals are using the platform to buy goods with stolen identities and credit cards
- By Matt Holden
- Mar 03, 2015
Just how safe will the "Internet of Toys" be for your children?
- By Ginger Hill
- Feb 24, 2015
Delivers reliable, fiber-like performance via unlicensed wireless spectrum.
Intelligence agencies can intercept and decrypt communications without informing wireless network providers, foreign governments or the individual user.
- By Ginger Hill
- Feb 20, 2015
The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.
- By Matt Holden
- Feb 18, 2015
Executive actions aim to increase information sharing among private sector companies and federal law enforcement.
- By Matt Holden
- Feb 13, 2015
A line in the privacy policy states the television may record conversation and send it to a third party.
- By Matt Holden
- Feb 10, 2015
A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.
- By Matt Holden
- Feb 09, 2015
The health insurance company is working with the FBI to come to a solution.
- By Matt Holden
- Feb 05, 2015
By 2019, it is predicted that more than half a billion wearable devices will be in use each day.
- By Ginger Hill
- Feb 04, 2015
Long-trusted detection technologies increasingly ineffective says 75% of IT and security professionals in findings released by Spikes Security and Ponemon Institute.
One tech expert says biometrics are good, but there are still problems to consider.
- By Matt Holden
- Jan 29, 2015
National Data Privacy Day marked by new technology from TextPower, SnapID that verifies your identity while simplifying website logins and replaces usernames and passwords.
A case of domain hijacking determined by CyberSecurity Malaysia.
- By Ginger Hill
- Jan 26, 2015
First system able to process 2.5 billion transactions per day built for mobile economy; capable of real-time encryption for safest mobile transactions, capable of real-time analytics on transactions 17X faster than competition at a fraction of the cost.
Maybe people are becoming number to hearing about "strong, unique passwords."
- By Ginger Hill
- Jan 21, 2015
His emphasis was on protecting families, especially children.
- By Matt Holden
- Jan 21, 2015