iOS app Android app

Cyber Crime

Admiral Rogers Talks Openly About The NSA But Not Quite

Anna Wilding | Posted 07.18.2016 | DC
Anna Wilding

Admiral Michael Rogers has quite a task afoot, as Director of the National Security Agency and the military's Cyber Command Mission Force. Speaking at a luncheon organised by retired Captain Kevin Wensing, Admiral Rogers said that the agency will eventually contain 6200 dedicated computer personnel split into 133 teams.

Zuckerberg Masks Mic and Cam on his MacBook. Digital Privacy Undone. Fact or Fiction?

Anurag Harsh | Posted 07.12.2016 | Technology
Anurag Harsh

The right to privacy is a constitutional gem. In the recent past it’s been assaulted and fraught with all manner of conspiracy theory. We are suscep...

Mobile Money: Fly Me To The Cloud And Let Me Pay My Auto Loan

April Rudin | Posted 05.13.2016 | Technology
April Rudin

Minor confession: At the 2016 Consumer Electronics Show, where I ran a panel on the promise of digital payment systems, I found my thoughts drifting ...

6 Top Ways to keep your iPhone Secure from Cyber Attacks

Toby Nwazor | Posted 05.13.2016 | Technology
Toby Nwazor

Credit We are finally at the age that many technology prophets foresaw many years ago and it is moving faster than we could have anticipated. We no l...

Hackers Are Learning Customer Service Tactics To Target Victims

Reuters | Casey Williams | Posted 04.12.2016 | Technology

TEWKSBURY, Mass (Reuters) - When hackers set out to extort the town of Tewksbury, Massachusetts with "ransomware," they followed up with an FAQ explai...

Hackers Are Using Expired Domains To Launch Attacks

Reuters | Casey Williams | Posted 03.17.2016 | Technology

March 16 (Reuters) - Expired domain names are becoming the latest route for cyber criminals to find their way into the computers of unsuspecting users...

How to Destroy an Organization in Three Ways With Nothing but Free Apps

Ian Khan | Posted 11.30.2015 | Technology
Ian Khan

I did not want to be so dramatic, but I could not help but be completely honest as well. The end possibility is that your entire organization may suffer the fate of Sony Pictures, target, Anthem and others who have been shaken by hacks and vulnerabilities in their networks.

Cyber Threats to Your Business: 4 Ways to Safeguard Your Assets

John Bowen | Posted 10.05.2015 | Business
John Bowen

Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.

The Day I Was Terrorized By Virtual Kidnappers

Valerie Sobel | Posted 08.28.2015 | Crime
Valerie Sobel

Two days ago (August 24, 2015) at 12:49 pm Pacific time, I received a phone call, "This is a kidnap ransom demand call," that for a fleeting second I considered a joke. After my light response it was immediately made clear to me that I either "listen up!" or my daughter is dead.

The Ultimate Encryption Debate

Amitai Etzioni | Posted 07.13.2016 | Technology
Amitai Etzioni

I gained dubious distinction for arguing that a new form of encryption is not merely the techies' major gift to terrorists and criminals -- but also a gross violation of the constitution! Hence, it should be outlawed.

4 Super Easy Ways to Keep Cyber Criminals Out of Your Life

TJ Trent | Posted 06.28.2015 | Technology
TJ Trent

Technology is part of our lives. Now criminals no longer have to break in to steal our valuables, violate our privacy or harm our loved ones. They can and do terrorize us remotely from under the cover of darkness afforded them by the Internet of Things.

17 Tips You Can Do Today to Protect Your Online Passwords

Arkady Bukh | Posted 05.06.2015 | Technology
Arkady Bukh

Failing to take noral precautions with cyber security can wreck your day -- and all of the days you have coming. All of the talk about cyber security, hackers and identity theft can leave the average person befuddled.

Are Banks In Store For An 'Armageddon' Cyber Attack?

HuffPost Live | Posted 03.02.2015 | HuffPost Live 321

As with most things in the modern age, our banking has largely shifted from physical, brick-and-mortar banks to a "secure" website or app that handles...

What Apple Is Missing About Cyber Security

Sanjay Sanghoee | Posted 04.17.2015 | Technology
Sanjay Sanghoee

What Time Cook seems unable or unwilling to recognize, is that privacy and security are inextricably linked. You can't have the former without the latter, and just because Apple won't reveal information to the government doesn't mean that information could never be hacked by criminals.

Keyboard Cowards

Jay Tavare | Posted 04.08.2015 | Technology
Jay Tavare

I mean you don't even have to be famous or a public figure to have some stranger hating on you, just because they can safely do it from behind closed doors, hidden, using fake names and false social media profiles. It truly is a new phenomenon that is on the rise everywhere.

A No-B.S. Look at the Top Cyber Threats for 2015

Jason Glassberg | Posted 03.11.2015 | Small Business
Jason Glassberg

While the risk of cyber attacks is growing, it's important for small and medium-sized businesses to keep perspective and focus on the real threats that are most likely to target their operations.

Social Engineering: 9 Ways to Keep Your Identity Safe

Adrian Nazari | Posted 02.10.2015 | Money
Adrian Nazari

If you're feeling a little paranoid about identity theft, your concerns are justified. You're not being paranoid; these threats are real. Oftentimes, in fact more frequently than you might guess, thieves get through by social engineering.

Worrying About Cyber Warfare on Cyber Monday

John A. Tures | Posted 01.31.2015 | Politics
John A. Tures

As most Americans log on after a long holiday weekend from work, they are eager for all kinds of sales and savings. They probably aren't thinking about cyberterrorists, rogue states, and great powers eager to take the U.S.A. down a peg or two. But maybe they should.

Finding a Cure for Medical Identity Theft

Joe Ross | Posted 01.14.2015 | Money
Joe Ross

As we head into the final stretch of 2014, large-scale financial and retail breaches are top-of-mind for many of us, especially as we get ready for holiday shopping. But here is another type of identity theft that all consumers should be aware of and begin to monitor for -- medical identity theft.

Payments 101: How to Make Shopping More Secure

Joe Ross | Posted 10.15.2014 | Technology
Joe Ross

There's a movement happening in the payments world. With so many retailer data breaches in the past year, consumers, financial institutions, retailers and security professionals are wondering, plain and simple: how can we make shopping more secure?

My Secret: I Was One of Those Girls Who Had Sex With Older Men on the Internet

Erin McKelle | Posted 10.07.2014 | Women
Erin McKelle

Yes, there was something wrong, but it wasn't with me, and my cyber sex was nothing more than a symptom of something bigger. It was my way of showing that I felt out of control and helpless.

Cyber-Ransom and Online Extortion - 5 Ways You Could Fall Victim

Michael Gregg | Posted 09.01.2014 | Technology
Michael Gregg

Cyber-ransom is a relatively new crime on America's digital shores and it is spreading fast. While ransomware has actually been around for almost 10 years, it's mostly been limited to Russia and parts of Europe -- until now.

FBI Director 'Grappling With The Question' Of How To Fix Hiring Policies Concerning Pot

The Huffington Post | Paige Lavender | Posted 05.21.2014 | Politics

James Comey, director of the Federal Bureau of Investigation, said Monday the agency is "grappling with the question" of how to amend its hiring polic...

Could Your Mother's Online Sharing Cost You Big Time?

Adam Levin | Posted 07.01.2014 | Technology
Adam Levin

While it can be a source of embarrassment when family stories go around the dinner table, the advent of social media makes that table very big, and surely, you don't know everyone who's been invited to dinner.

Internet Crimes

Jasmina Tesanovic | Posted 06.01.2014 | Technology
Jasmina Tesanovic

I don't believe Aaron Swartz ever wanted to become a martyr. He just wanted to live within a world that he believed he could fix, a world that was technically malleable and hackable, where he could be active and ingenious, even if that reform effort might involve a few false steps.