From the moment that my children had access to things like camera phones or laptops with webcams, I have had numerous conversations about how any photo you take can be shared, and anything that is shared can be seen by the entire world.
Many technology executives don't have a favorable outlook on their ability to sideswipe cybercriminals, according to research conducted by McKinsey and World Economic Forum.
It's easy, for instance, for a parent to access their child's name and Social Security number, then open up a phony account--even if the victim is literally a child. Most companies don't check the ages, so that's why this crime can go undetected for years.
You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats.
There will always be a place for providing police departments with equipment to respond to violent threats, but right now taking a step back to see how more can be done to protect against electronic threats is not only right, it is vital.
As smartphones are increasingly used for financial transactions, sharing sensitive personal and proprietary information, and for operating other devices (such as home security systems), the field for intruders grows and becomes increasingly attractive.
OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced.
We all have our areas of interest -- make that obsession -- and when something related to them crops up online, we can be instantly transformed into monster click machines. The problem here: Many of those clicks can either lead to your victimization or becoming an unwitting co-conspirator in cybercrime.
Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and credit card numbers. But there are other devices that hold sensitive data that we don't really talk about. For example, printers.
There's one born every minute. Many scammers use the names of valid lottery organizations, but this doesn't mean the legit entities are involved. The latest con is to tell someone they won a Powerball jackpot while planning on stealing their identity.
Is the password system really broken? In reality, the problem with passwords today is largely due to how they're managed by applications.
Another day, another big hack discovered. According to reports from the New York Times, the WSJ, and numerous other publications, a small group of cyber criminals based out of Russia were apparently able to collect around 1.2 billion usernames and passwords from more than 400,000 websites globally.
You’ve surely heard of “B2B” or business-to-business marketing. The new game plan is “B2C” – business to consumer ...
What if driving your car exposed you to the tender mercies of online criminals the same way that using a credit card at Target last fall did?
The ripple effect continues to haunt Target: It's expected that seven of its board of directors members may be replaced because they failed to provide effective oversight into the corporation's data-protection risks. Boards simply need to be more proactive in safeguarding their companies against data breaches
Cyber criminals go after brand names like vultures, infiltrating company websites, hijacking mobile applications and tainting online ads, among other tricks.