With winter melting, and spring coming into view, lots of folks are re-emerging and looking to get involved. My team and I generated a list of 5 ways to get involved in tech this spring.
Although there is no foolproof way to prevent identity theft or other security risks, cutting down on the amount of easy-to-change mistakes you make on a daily basis can help make you less of a target.
It's never a good idea to connect to the public WiFi network at a hotel (or anywhere else for that matter), but here's yet another reason why travelers should be careful - a new report found that the WiFi router used by most hotels is vulnerable to hackers.
"USB Killer" is a device, which can literally fry your computer. The device was hand-made by a Russian hacker, nicknamed as Dark Purple.
Marc Goodman is a one-man Geek Squad who began his law enforcement career as a beat cop in Los Angeles and became the departmental computer expert. With a nose for wrongdoing and digital aptitude, Marc has served as the FBI's Futurist in Residence, Interpol advisor, lecturer and now author.
Failing to take noral precautions with cyber security can wreck your day -- and all of the days you have coming. All of the talk about cyber security, hackers and identity theft can leave the average person befuddled.
Hackathons are taking the world by storm, and at the forefront of this movement is former MHacks Organizer Dave Fontenot.
Cyberterrorism is on the upswing and algorithmic terrorism is the next iteration. So much of our economy is underpinned by electronic trading that protecting the markets is paramount.
Computers run the world--our airports, airplanes, cars, hospitals, stock markets and power grids--and these computers too are shockingly vulnerable to attack. Though we're racing forward at breakneck speed to connect all the objects in our physical world to the Internet, we still fundamentally do not have the trustworthy computing required to make it so.
ATMs randomly coughing up cash -- and a lot of it. Like an international lottery, the phenomenon has occurred in more than 30 countries, leading to potentially as much as $1 billion in stolen funds.
A lot of what passes for common sense about this subject is just plain wrong -- and often risky. Here's a list of some mistaken beliefs that can get you ripped off or hacked, or your computer infected with something nasty.
Productivity is seriously hindered once an internet blacklisting is placed on a company as a result of zombie attacks or low security posture. Don't let this happen to your company.
Cyber criminals know that their electronic attacks are likely to be both successful and profitable, and therefore no one should expect any drop in the pace or intensity of such attacks. There are steps companies can take to minimize the losses associated with such attacks.
Health insurance provider Anthem announced late Wednesday, Feb. 4 that it had experienced a massive security breach which exposed the information of up to 80 million of its current and former customers, as well as employees.
If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.
If a motivated hacker targeted you, you literally would not know you had been attacked until after it was over. From a skilled hacker's point of view, you have glass windows, glass doors, the lights are off, there's nobody home and you left the back door open.