iOS app Android app

Computer Security

Hey, Corporate Director!

Edward Guiliano, Ph.D. | Posted 12.20.2014 | Technology
Edward Guiliano, Ph.D.

The campaign to stop cyber-crime begins with educating the next wave of professionals, but ongoing education and idea exchange are the ultimate keys to confronting cybercrime on the ground and in the boardroom.

Google Uncovers Bug In Widely Used Web Encryption Technology

Reuters | Jim Finkle | Posted 10.14.2014 | Technology

By Jim Finkle BOSTON, Oct 14 (Reuters) - Three Google Inc researchers have uncovered a security bug in widely used web encryption technology that t...

Gerry Smith

Apple Joins Rush To Fix Shellshock Bug Infecting The Internet | Gerry Smith | Posted 09.26.2014 | Technology

Apple said Friday that it was fixing a security flaw in some versions of its operating system for Mac computers, joining other tech companies that are...

New Security Bug May Be As Serious As 'Heartbleed'

Reuters | Jim Finkle | Posted 09.26.2014 | Technology

By Jim Finkle BOSTON, Sept 25 (Reuters) - Hackers have launched attacks exploiting the newly identified "Shellshock" computer bug, researchers warn...

New Software Bug May Be Worse Than 'Heartbleed'

Reuters | Posted 11.24.2014 | Technology

By Jim Finkle BOSTON (Reuters) - A newly discovered security bug in a widely used piece of Linux software, known as "Bash," could pose a...

What Are Some Computer Hacks That Hackers Know But Most People Don't?

Quora | Posted 07.19.2014 | Home

This question originally appeared on Quora: What are some computer hacks that hackers know but most people don't?. Answer by Kevin Borders, Former...

How I Took My Hobby To The Next Level

Arlan Jaska | Posted 12.02.2013 | Teen
Arlan Jaska

Getting hands-on experience in what we were interested in could be seen as immoral, and perhaps more importantly, illegal. But how can you learn to secure a system if you don't understand how it can be attacked?

Gitmo Logistics & DoD Computer Mess Likely to Delay 9/11 Case

Daphne Eviatar | Posted 11.20.2013 | World
Daphne Eviatar

Witnesses provided more details of the Defense Department's computer mess-ups and confidentiality breaches in the 9/11 hearings on Friday, and defense lawyers renewed their request to delay the hearings until those problems could be resolved.

And What's Your Mother's Maiden Name?

Neale Godfrey | Posted 11.12.2013 | Fifty
Neale Godfrey

dentity theft can be accomplished as simply as someone getting information from your charge receipt or stealing your credit card. But, as more safeguards have been implemented, thieves have become more sophisticated.

60 Days of Hacker Assaults

Hemanshu Nigam | Posted 05.05.2013 | Technology
Hemanshu Nigam

Although the average computer user has little involvement with such significant security threats, the increasing prevalence of cybercrime places greater responsibility on consumers to protect their individual identities and personal information from hackers.

The Content Brief: What's Up With All the Hacking?

Shawn Amos | Posted 04.24.2013 | Technology
Shawn Amos

Is there a hacking epidemic? Earlier this week, Burger King saw its Twitter account get a McDonald's makeover, and then Jeep had its feed taken over b...

Intel, McAfee Look to Redefine Consumer Security

Jeff Hindenach | Posted 03.09.2013 | Technology
Jeff Hindenach

At the Consumer Electronics Show today, Intel and McAfee announced new technology that they've been developing over the past year. The announcement couldn't come at a better time for McAfee, which spent much of December trying to distance itself from bad press surrounding its founder.

Gerry Smith

Hackers Reveal 'Mission Impossible' Security Tricks To Avoid Getting Hacked | Gerry Smith | Posted 12.20.2012 | Technology

When Adrian Lamo goes online, he leaves nothing to chance. To log in to personal accounts, he uses a digital password generator -- a plastic key ch...

Gerry Smith

Mideast Computer Virus Highlights Iran's Cyber Focus, Experts Say | Gerry Smith | Posted 10.24.2012 | Technology

In recent weeks, computer hackers have attacked a Saudi Arabian oil company, a Qatari natural gas company, and several American banks. The level of da...

What Star Wars Teaches Us About Computer Security

Sean Michael Kerner | Posted 10.18.2012 | Technology
Sean Michael Kerner

Many have found inspiration and solace in Star Wars that can apply to the everyday real world, including data security. It teaches us that it is important to protect all the important data that you have with core access control.

Startling Percentage Of Computer Users Are 'Pirates'

The Huffington Post | Britney Fitzgerald | Posted 06.01.2012 | Technology

Are you a software pirate? 57 percent of the world's computer users confess to pirating software according to a recent Business Software Alliance (BSA...

Is It Possible for Hackers to Access My Computer's Webcam?

Quora | Posted 07.07.2012 | Technology

This question originally appeared on Quora. By Feross Aboukhadijeh, Stanford undergraduate, computer security enthusiast, and blogger Yes, bad guys...

Do Journalists Use Enough Security To Protect Their Sources? | CHRISTOPHER SOGHOIAN | Posted 12.27.2011 | Media

BRAVE journalists have defied court orders and have even been jailed rather than compromise their ethical duty to protect sources. But as governments ...

U.S. Reportedly Debated Cyberwarfare Against Libya

The New York Times | ERIC SCHMITT and THOM SHANKER | Posted 12.17.2011 | World

Just before the American-led strikes against Libya in March, the Obama administration intensely debated whether to open the mission with a new kind of...

Gerry Smith

Apple Laptop Flaw Found In Unlikely Place | Gerry Smith | Posted 09.21.2011 | Technology

A security researcher claims to have found a new security flaw in Apple laptops that could allow hackers to ruin laptop batteries, infect them with ma...

Computer "Security"

Andrew Reinbach | Posted 08.19.2011 | Technology
Andrew Reinbach

Right now, you're sitting in front of our pact with the Devil. When you finish reading this, you will do nothing about it.

DK Matai | Posted 05.25.2011 | Technology
DK Matai

Editor's Note: This post has been removed from the Huffington Post....

Companies Combine Efforts to Secure Data on USBs

Robert Siciliano | Posted 05.25.2011 | Business
Robert Siciliano

A survey of London and New York City taxi companies last year revealed that more than 12,500 portable devices are forgotten in taxis every six months; portable devices that may have troves of sensitive data.

Privacy? Forget About It

Lloyd Garver | Posted 05.25.2011 | Technology
Lloyd Garver

Online, we're safe from strangers knowing all kinds of things about us that we want to keep private, right? Wrong.

China Aggressive Cyberspace Foe: Targets U.S. Cyberspace to be an aggressive foe in cyberspace | Ellen Nakashima and John Pomfret | Posted 05.25.2011 | Technology

China is significantly boosting its capabilities in cyberspace as a way to gather intelligence and, in the event of war, hit the U.S. government in a ...