Another day, another big hack discovered. According to reports from the New York Times, the WSJ, and numerous other publications, a small group of cyber criminals based out of Russia were apparently able to collect around 1.2 billion usernames and passwords from more than 400,000 websites globally.
You’ve surely heard of “B2B” or business-to-business marketing. The new game plan is “B2C” – business to consumer ...
What if driving your car exposed you to the tender mercies of online criminals the same way that using a credit card at Target last fall did?
The ripple effect continues to haunt Target: It's expected that seven of its board of directors members may be replaced because they failed to provide effective oversight into the corporation's data-protection risks. Boards simply need to be more proactive in safeguarding their companies against data breaches
Cyber criminals go after brand names like vultures, infiltrating company websites, hijacking mobile applications and tainting online ads, among other tricks.
Cyber insurance is now booming, with about 50 carriers in the industry. An increasing number of companies have cyber insurance to protect against cyber crime. However, businesses claim it's not easy to get adequate coverage.
Consumers really get stiffed when there's a data breach, having to change their passwords, replace credit cards, and other bothersome tasks, not to mention the grief over stolen personal information.
We all know that 123qwe is such an easy password to remember, especially if it's for all gazillion of your accounts. You know whom else finds this very convenient? Hackers!
Facebook offers a hefty amount of security measures that parents and teens should know about. Here are a few highlights.
I had a great epiphany on the train last week which was that I'm beginning to see hacking not merely as cracking codes, or as Richard Stallman says "playful cleverness", but as man's will to deconstruct things in order to rebuild them into something better.
You never know when malware will bite. Even browsing an online restaurant menu can download malicious code, put there by hackers.
As we all know, software engineers are the smartest, sweetest, most pretentious bastards in corporate America. I should know -- I'm engaged to one of them.
This is Day 2 of my journal shooting my history on computer hacking at HOPE X Conference.
How low can scammers go? The latest is phony Facebook profiles that use identities of deceased victims of Malaysia Airlines Flight MH17 -- claiming th...
Companies like Intel, Google, Samsung, Microsoft, General Electric, Cisco, AT&T and IBM, which are already taking an active role in Internet of Things development, will soon be placing a greater emphasis on risk-mitigation with these products - and developers who can deliver on security, in addition to performance and UX, are likely to be a step ahead of the competition.
So many people fail to learn about phishing scams, a favorite and extremely prevalent scam among cybercriminals. A type of phishing scam is to lure the user onto a malicious website.