The NSA's seemingly limitless ability to crack encryption has not only put the privacy of private citizens in danger, it also threatens to shake the foundations of online business.
The network these brave LGBT troops were building, using a new generation of social tools like Facebook, was strong, but it had one glaring weakness: Its security was completely dependent upon the policies and the precautions put in place by the companies that hosted it.
Child identity theft is a growing problem. It is cruicial for businesses to make sure any personal information they collect for children is properly protected.
Caller ID spoofing is when a telephone's caller ID displays a number that does not belong to the person calling. The telephone network is tricked int...
Until now, small business owners and managers have felt safe because they weren't large enough to draw the attention of attackers. But, in what seems like the blink of an eye, all that has changed.
There was a collective holding of breath on Thursday when the NASDAQ suddenly shut down trading. Terse reports and statements that "technical problems...
Be cautious and smart when using social networking sites. The feeling of anonymity that comes from no face-to-face interaction is an illusion. All information and photos, once posted publicly, is free to access and use and stays in server farms for years to come.
To reduce the number of child identity theft cases, it's important for parents to get in the know. Here are a few tips for parents to help prevent child identity theft from occurring.
While it's unsettling to have your car invaded or stolen while you're on a Labor Day trip with your family, it's not life threatening. What scares me is when a car hacker evolves from messing with your doors to invading your car's computer system.
The fear mongers and Obamacare haters make a scary point and want you to know that as soon as the Patient Protection and Affordable Care Act goes live...
Fans want to know when athletes have engaged in illegal activity to gain a competitive edge. When digital forensics is applied, it offers the hope of restoring some of the fairness and wholesomeness that have been lost in professional sports.
It's reported that Android malware threats exceed those of PCs. Gone are the days when hackers attacked laptops; instead, mobile devices are the target and, ironically, are less protected than their counterparts.
When I talk to a business about data theft, one of the topics that always comes up is password security. You can have one of the most advanced security systems in place, but if that security system has people and passwords as a component, there will be vulnerabilities.
It's a jungle out there on the Internet. Every day you go out to visit websites, check on your checking account, shop on eBay, Google the news, and every day there are predators waiting to pounce on your passwords, abscond with your accounts and infiltrate your identity.
The White House has made cybersecurity one of its top priorities, topping off its efforts with an Executive Order that set out to do many things, including establishing a "Cybersecurity Framework" that would set forth basic measures companies could take to protect themselves from a range of cyber-attacks.
The 2013 Black Hat conference this past week proved once again that anything and everything can be hacked.