This is Day 2 of my journal shooting my history on computer hacking at HOPE X Conference.
How low can scammers go? The latest is phony Facebook profiles that use identities of deceased victims of Malaysia Airlines Flight MH17 -- claiming th...
Companies like Intel, Google, Samsung, Microsoft, General Electric, Cisco, AT&T and IBM, which are already taking an active role in Internet of Things development, will soon be placing a greater emphasis on risk-mitigation with these products - and developers who can deliver on security, in addition to performance and UX, are likely to be a step ahead of the competition.
So many people fail to learn about phishing scams, a favorite and extremely prevalent scam among cybercriminals. A type of phishing scam is to lure the user onto a malicious website.
This is part one of my three-day diary on filming my currently untitled history of hacking documentary at the Hackers On Planet Earth X (HOPE X) Convention hosted by the legendary 2600 Hacker Quarterly.
Summertime is here -- and that means sunshine and vacations. Most people love summertime, including scammers! Hackers can use this time to take advantage while we are planning vacations or on vacation or just enjoying fun in the sun. Here are some key scams to watch out for this summer.
Anyone looking for a glimpse into the technologies that will change our lives, businesses and organizations in the coming decades received an eyeful at the Smart America Expo in Washington, D.C. in June.
A credit freeze locks down your credit report so lenders can't see your scores, making your credit/SSN useless to them because they don't know their risk level.
Everyone from Samsung to Intel to GE to you-name-it is already in the space and it's getting very exciting. It's also getting very real, with both advantages and risks rising to the surface. As we go through the 2nd half of 2014, we're seeing 3 key trends.
Corporate America and the intelligence community promote a panicked militaristic national mood because it justifies both government secrecy and huge taxpayer outlays for defense.
If a stranger stopped you on the street and requested your e-mail address and birthdate, would you give it to that person? A rational person would nev...
If you’ve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their “enemy,” you have some familiarity with an ad...
Worried about finding a job after you graduate from college? Worried about paying off your debts? It gets uglier: New college grads need to think about their identities being stolen. One-third of identity theft complaints come from young adults.
If you've ever plugged an American, 110-volt appliance into a European 220-volt socket, you've experienced firsthand what happens when an electrical device overloads: fizzle, pop, smoke. At best, you've temporarily damaged the appliance. At worst, the device catches fire and burns the place down.
Cyber-ransom is a relatively new crime on America's digital shores and it is spreading fast. While ransomware has actually been around for almost 10 years, it's mostly been limited to Russia and parts of Europe -- until now.
Insecure code continues to be a major cause of data breaches today. So why are so many talented developers writing "bad code"?