Miniature devices planted on ATMs or at gas stations to steal credit and debit card data almost impossible to see.
- By Ginger Hill
- Jul 07, 2014
In theory, IoT is a great concept; it all boils down to ease of use vs security. Which is more important?
- By Allan Pratt
- Jul 01, 2014
Discussions concerning several players, including Jose Veras and Bud Norris, and other confidential data was hacked from "Ground Control."
- By Ginger Hill
- Jul 01, 2014
Throughout Mexico, residents trust Presta Prenda de Banco Azteca for short-term, secured loans on jewelry, electronics and other valuables. Much like the pawn shop business model in the United States, Presta Prenda customers obtain immediate cash with various repayment options.
- By Mig Paredes
- Jun 30, 2014
Over 300,000 servers still vulnerable; McAfee offers free detection tool.
- By Ginger Hill
- Jun 24, 2014
Total number affected still unknown, but company to offer free credit monitoring.
- By Ginger Hill
- Jun 19, 2014
What it all boils down to is internal vs. external cyber communications.
- By Ginger Hill
- Jun 18, 2014
Integrated with the smartphone's firmware, it is impossible to remove or disable the malicious app.
- By Ginger Hill
- Jun 18, 2014
Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.
- By Ginger Hill
- Jun 12, 2014
Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
- By Ginger Hill
- Jun 11, 2014
Parents of school children are standing up against Big Data when it comes to their children's personal information.
- By Ginger Hill
- Jun 09, 2014
Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.
- By Ginger Hill
- Jun 05, 2014
Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.
- By Ginger Hill
- Jun 04, 2014
Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.
- By Sara Gates
- May 30, 2014
Understanding the difference and likenesses between data privacy, information security and confidentiality provides a rich tool set to protect information as long as the proper protection paradigm is applied.
- By Michelle Dennedy , Jonathan Fox , Thomas Finneran
- May 23, 2014
Long-winded privacy policies create confusion and frustration for Internet consumers.
- By Ginger Hill
- May 22, 2014
eBay officials urging all 112 million users to change their passwords immediately to help rectify recently-discovered breach.
- By Ginger Hill
- May 21, 2014
A pioneer in the biometric industry is worried about what he's seeing take place with this technology, specifically facial recognition.
- By Ginger Hill
- May 19, 2014
Gallagher Security, a global leader in the design and manufacture of innovative access control, intruder alarm and perimeter security systems, highlight its latest FIPS 201-2 compliant solution at GovSec 2014.
Baby Boomers have created a "booming" home health care industry, expected to reach $150.8 billion by 2018, giving rise to reimbursement fraud.
- By Mark Robinton
- May 15, 2014