As we all know, software engineers are the smartest, sweetest, most pretentious bastards in corporate America. I should know -- I'm engaged to one of them.
This is Day 2 of my journal shooting my history on computer hacking at HOPE X Conference.
How low can scammers go? The latest is phony Facebook profiles that use identities of deceased victims of Malaysia Airlines Flight MH17 -- claiming th...
Companies like Intel, Google, Samsung, Microsoft, General Electric, Cisco, AT&T and IBM, which are already taking an active role in Internet of Things development, will soon be placing a greater emphasis on risk-mitigation with these products - and developers who can deliver on security, in addition to performance and UX, are likely to be a step ahead of the competition.
So many people fail to learn about phishing scams, a favorite and extremely prevalent scam among cybercriminals. A type of phishing scam is to lure the user onto a malicious website.
This is part one of my three-day diary on filming my currently untitled history of hacking documentary at the Hackers On Planet Earth X (HOPE X) Convention hosted by the legendary 2600 Hacker Quarterly.
Summertime is here -- and that means sunshine and vacations. Most people love summertime, including scammers! Hackers can use this time to take advantage while we are planning vacations or on vacation or just enjoying fun in the sun. Here are some key scams to watch out for this summer.
A credit freeze locks down your credit report so lenders can't see your scores, making your credit/SSN useless to them because they don't know their risk level.
If a stranger stopped you on the street and requested your e-mail address and birthdate, would you give it to that person? A rational person would nev...
If you’ve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their “enemy,” you have some familiarity with an ad...
Worried about finding a job after you graduate from college? Worried about paying off your debts? It gets uglier: New college grads need to think about their identities being stolen. One-third of identity theft complaints come from young adults.
If you want ultimate reassurance of destroying data, destroy the device with a hammer or drill through the drive with multiple holes.
Small business (SMB) cyber security is a hot topic for us. On a weekly basis, we at CSID see many SMBs dealing with the aftereffects of getting breached and losing sensitive information.
Nowadays, terms like firewalls, encryption, anti-virus and cloud providers are just as important to a bank's security as are the armed guards, huge windows, security cameras and steel vaults.
A data breach can slug below the belt and knock a healthcare business flat on its back, as was the case with Columbia University and the New York and ...
Here are the red flags that may indicate you or your business has suffered a breach.