Nothing's secure. Believe in that mantra and you have at least a decent chance of avoiding becoming the next victim of a data breach, PoS attack, drive-by download or any one of the other many cyber threats that stalk us all daily.
That little thing that you stick in your computer to store or transfer data can also mean very bad news.
I visited the Facebook campus, 1 Hacker Way, Menlo Park, California. and here are 10 things I learned: 1. There is such a thing as a free lunch (bre...
The Tumblr blog Hackers of NY launched in February this year and very quickly became a phenomenon, spawning spin off sites everywhere from Miami to Bangalore -- there's now a "Hackers of..." in nine countries and 13 cities.
Cyberwarfare is now largely seen as an integral part of modern warfare by most developed nations. Until now, however, we have yet to see sophisticated cyber tactics be used by jihadist groups like al-Qaeda or ISIS. But that could soon change.
Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king's ransom of new clicks to kid-friendly content, hackers could well have a field day.
Home Depot hasn't really told us much about their data breach so far, and for that, I say shame on them. One of the few things they did share though, and quite categorically, is that no debit card PINs were exposed in the breach.
co-authored by Dr. Stephen Bryen, Founder & CEO ZiklagSystems Something is wrong with Home Depot's explanation of the hack on the point of their cas...
By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app.
What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybercrime ring.
It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age.
Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into.
As the smoke clears from this latest attack on privacy and our collective sense of decency, it's becoming more and more likely that a deft use of personally identifiable information was used to unlock the nude celebrity photo troves that flooded the Internet.
If the Home Depot breach turns out to be as bad or worse than the Target breach, certain things will be unavoidable for the home improvement giant. But there are some things the company can do to help reduce the short and long term impact and cost.
It's our Internet, and if we don't take care of it, it won't take care of us.
If you are not particularly worried about being high-minded here, there is another consideration, which is, by looking at the pictures, you are giving criminals a purpose for their act (at least with a degree or so of separation) and causing someone distress. Is it really worth it?