Here are the red flags that may indicate you or your business has suffered a breach.
What usually happens is that the criminals establish Wi-Fi hotspots that trick people into thinking they are legitimate public Wi-Fi locations -- people take the bait and log on.
As consumers we need to ask the companies whose sites we are visiting who they are working with, and be really clear what steps they are taking to prevent themselves being the weakest security link in what is an already weak website technology chain.
Though you won't be able to completely eliminate junk mail, the following approaches will considerably de-clutter your mail box.
Is it coincidence that Beth Jacob CIO resigned from her job as chief information officer of Target Corporation? Or could this possibly be connected to...
Capital One is leading the way for banks helping customers smoke out potentially invalid charges. Capital One's service is free, called Second Look. S...
Most smartphones -- Android, iPhone, Windows phones, are made in China. How many of them have Trojans lurking inside?
PIN may sometimes stand for pilfered identification number if a hacker gets yours. And it's easier than ever for thieves to get your PIN from an ATM, coming up with clever ways to beat security technology.
Never mind the government nosing in on your business; there's a much bigger snooper out there that's mining your personal data: thousands of companies whose names you may not even know.
Do you really know what your kids are doing all the time? Probably not, unless you’re a stalker (just kidding). But really, there has to be some ele...
Protecting your Gmail account means you must activate some tools that Google offers, and you must increase your scam savvy intelligence in order to spot phishing scams. If you do both, you can have a very well-protected Gmail account.
Ask yourself: As a decision maker for your business or employer, when it comes to protecting your organization’s customers’ or clients’ personal data, how proactive are you?
How much of "you" is stored inside your smartphone? For some of you, the answer will be "My entire life." And that's practically true. For many, all sorts of highly private, sensitive information, including photos, are stored in that little device called a smartphone.
Recently a settlement was obtained between 2 companies with the FTC. The charge was that these organizations failed to secure their mobile apps, which...
Haven't companies learned from that giant retailer breach in December of 2013? That big retailer was left toppled. Companies don't realize that if they nickel-and-dime security, they'll get what they pay for.