For some social networking sites, security is not a top priority. Some do not protect your data with the same vigilance you could expect from your ban...
The hacking of Google's servers in China was directed by that country's Politburo, according to diplomatic cables disclosed today by WikiLeaks. The New York Times reports the role of the Chinese government in the Google attacks.
It's not just the holiday season for shoppers -- cyber-criminals look forward to this period of increased retail activity as a way to steal our money and personal information.
If Willie Sutton had been a hacker, we know what he'd have thought about cloud computing. Sutton, of course, was the 1930s robber famous for his quip that he robbed banks "because that's where the money is."
Hackers and internet geeks, like other rebels, are creating and living in a world where the accepted rules and laws simply don't apply, and being able to circumvent them is more than enough reason to do it -- a decidedly punkrock attitude.
So-called "carding" websites are providing criminals with online forums to buy and sell stolen identification and financial information. Don't get trapped in the net.
Debra Black got hit with the lucky stick. Not because she leads a privileged life, but because she was able to jump off the melanoma train to nowhere good, just as it was leaving the station.
How much of the intrusion detection and intrusion prevention systems designed by the U.S. government is appropriate for use by U.S. industry? Who should be controlling the systems?
Here are a few safety tips to help your student stay safe as they prepare and use their electronic media devices back at school.
A properly trained and equipped crook could unravel your 5 or 6 character computer password in less time that it takes to eat lunch and make a quick stop at the dry cleaners.
ATM skimming alone is responsible for $350,000 of fraud daily exceeding a billion dollars in losses annually.
Research in Motion unveiled its new BlackBerry today, BlackBerry Torch, which features a touchscreen as well as a slide-out keyboard and lots of other cool features.
A comprehensive understanding of what identity theft is and what it is not empowers citizens to make informed decisions about how they should protect themselves.
WiFi is everywhere. WiFi wasn't born to be secure. It was born to be convenient. Anyone using an open unsecured network risks exposing their data.
You didn't think Apple was going to let GoogleTV go unchallenged, did you? The company is getting ready to launch a new, cheaper version of AppleTV.