In a report, the Senate detailed how various contractors for the U.S. military's Transportation Command (TRANSCOM) had been the subject of repeated and serious cyber intrusions in a period spanning 2012 through 2013.
Busy managers have a tendency to stay inside the walls of their organizations, often struggling to find the time to read industry blogs, network with peers, meet up with analysts or attend new and interesting events. Don't fall into this trap.
Cyberwarfare is now largely seen as an integral part of modern warfare by most developed nations. Until now, however, we have yet to see sophisticated cyber tactics be used by jihadist groups like al-Qaeda or ISIS. But that could soon change.
BigPill Drug stores began in 1960 and grew to 35 stores by 1990. The company had more than 100 stores in 2000. It is now a publicly traded company, w...
Cybercrime is a massive multinational industry that regularly makes many attempts to breach major institutions. Why so many of those efforts have been succeeding lately, on such a large scale, is due partly to how smart an organization needs to be to defend against them.
Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king's ransom of new clicks to kid-friendly content, hackers could well have a field day.
Home Depot hasn't really told us much about their data breach so far, and for that, I say shame on them. One of the few things they did share though, and quite categorically, is that no debit card PINs were exposed in the breach.
If you watched this drama closely, you surely noticed how narrowly we conceptualize corruption in America. In effect, general influence peddling and election purchasing, which we see more commonly, are legitimate.
co-authored by Dr. Stephen Bryen, Founder & CEO ZiklagSystems Something is wrong with Home Depot's explanation of the hack on the point of their cas...
I slowly dialed the FBI field office in Chicago and listened to the numerous voice prompts. Not sure what to press, I eventually chose '3' since I am a media representative. A female agent answered. "Who would I speak to if, uh, compromising material was stolen from my phone?" I asked.
By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app.
What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybercrime ring.
It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age.
Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into.
Obama's opponents have cynically treated these challenges as political footballs, sweeping them into their relentless narrative of a weak, vacillating and dangerous president and a feckless NATO. But NATO's leaders impressively rallied around the administration's plans, approving a sweeping series of actions that should -- but probably won't -- quiet the critics.
co-authored by Dr. Stephen Bryen, Founder & Chairman Ziklag Systems ABI Research estimates that cyber security spending on the critical infrastructur...