Most smartphones -- Android, iPhone, Windows phones, are made in China. How many of them have Trojans lurking inside?
We should be in the relationship business, said media guru Jeff Jarvis, suggesting our longstanding mantra that content is king needs revisiting. Cre...
NATO must move past its current cyber defense policy and provide operational capabilities to defend itself and its allies by collective preemptive and retaliatory actions.
PIN may sometimes stand for pilfered identification number if a hacker gets yours. And it's easier than ever for thieves to get your PIN from an ATM, coming up with clever ways to beat security technology.
As part of its $530 million program to guarantee the security of the World Cup in Brazil the government of president Dilma Rousseff has set up a special cybercrimes unit.
Never mind the government nosing in on your business; there's a much bigger snooper out there that's mining your personal data: thousands of companies whose names you may not even know.
co-authored by Tom Malatesta, CEO Ziklag Systems Maybe you have heard of "the canary in the coal mine". Maybe not. ...
Do you really know what your kids are doing all the time? Probably not, unless you’re a stalker (just kidding). But really, there has to be some ele...
Protecting your Gmail account means you must activate some tools that Google offers, and you must increase your scam savvy intelligence in order to spot phishing scams. If you do both, you can have a very well-protected Gmail account.
One data breach could mean financial ruin for a SMB, so it is important to react quickly in case of a breach. If your business has been breached, here's what to do.
Ask yourself: As a decision maker for your business or employer, when it comes to protecting your organization’s customers’ or clients’ personal data, how proactive are you?
It has been predicted that everything in the future will be connected and "communicate" with one another. There is even a phrase for it: the Internet of Everything (IoE).
Millions of Americans may soon become part of an expanded government database that would give two federal regulatory agencies an up-close and personal view of their private financial lives that, if breached, could make for a really bad day for a whole lot of people.
I will be the first to admit that NSA surveillance originally began with good intentions to protect us, but they have gone much too far. Likewise neither the NSA, nor the nation as a whole, have gone far enough to stop the potentially dangerous hacking.
How much of "you" is stored inside your smartphone? For some of you, the answer will be "My entire life." And that's practically true. For many, all sorts of highly private, sensitive information, including photos, are stored in that little device called a smartphone.