iOS app Android app

Hacking

Are Elite Credit Cards Most Vulnerable to Hackers?

CompareCards | Posted 07.29.2015 | Money
CompareCards

The crooks always seem to be one step ahead of the security features and many cardholders are now wondering if there is anything they can do to take the target off their backs. Here are a few tips to consider that might help you fly under the radar of today's cyber criminals.

10 Industries That Could Profit From The Ashley Madison Hack

Adam Levin | Posted 07.24.2015 | Technology
Adam Levin

There are other industries that may well get a rise in the wake of the Ashley Madison hack. Here are 10 of the tragic winners.

We Need To Protect Drivers' Privacy As We Connect Cars To The Internet, Sen. Blumenthal Says

The Huffington Post | Alexander Howard | Posted 07.22.2015 | Technology

Connecting a car to the Internet raises different concerns than putting sensors, appliances, parking meters or thermostats online. That's why Sens. Ed...

Hackers Hijacked A Jeep With A Reporter Inside, And 5 Other Scary Hacks

The Huffington Post | Ryan Grenoble | Posted 07.22.2015 | Technology

Jeepers creepers!  It's time to take security on the "Internet of things" seriously. Wired reporter Andy Greenberg recently asked ...

Senate Bill Aims To Lock Hackers Out Of Connected Cars

The Huffington Post | Alexander Howard | Posted 07.21.2015 | Technology

The road to our connected future may be paved with good intentions, but it may not be secure enough to drive on. As reporter Andy Greenberg recently d...

Forget Ashley Madison! Any Website Can Arrange An Affair

The Huffington Post | Aaron Nemo | Posted 07.21.2015 | Comedy

By now, you've heard about the hacking of Ashley Madison, a website designed to help married men and women cheat on their spouses. So, what ...

Reputation Control + Cybersecurity Hurt In OPM Hack

Alan W. Silberberg | Posted 07.15.2015 | Technology
Alan W. Silberberg

Reputation. It is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke.

What to do if Someone Files a False Tax Return in Your Name

Nathaniel Sillin | Posted 07.09.2015 | Business
Nathaniel Sillin

Few things cause more concern than a letter in the mail from the Internal Revenue Service (IRS). Though the agency sends out letters or notices for many reasons, identity theft is one of the fastest-growing issues for the IRS.

When It Comes To Identity Theft, How Paranoid Should You Be?

Dr. Gregory Jantz, Ph.D. | Posted 07.07.2015 | Technology
Dr. Gregory Jantz, Ph.D.

Being in the therapy business, I'm constantly monitoring my own psychological state, probably not unlike physicians who regularly check their pulse. Lately, I'm monitoring a growing sense of being watched. I don't think I'm becoming paranoid, yet, but it's starting to feel that way.

Suggestions for Political Campaigns Using the Latest Digital Tools

Rebecca Abrahams | Posted 07.01.2015 | Technology
Rebecca Abrahams

Today's political campaigns are using the latest digital tools. Since the presidential race is in full swing, we thought we'd be extra patriotic this Fourth of July and offer free advice as to how the campaigns can protect against cyber breaches and take downs.

The Real Cybercrime

Rebecca Abrahams | Posted 06.25.2015 | Technology
Rebecca Abrahams

It now seems that the Office of Personnel Management, which had outsourced its data storage to other Federal agencies, has lost an astonishing 18 million personnel records, including most of those involving security clearances.

How Hackable Are Cars?

Quora | Posted 06.23.2015 | Technology
Quora

Like a lot of computer/software security discussions, there's "the realm of possibility" and then there's the real world.

DDoS Attacks Have Graduated to Extortion

Dave Lewis | Posted 06.23.2015 | Technology
Dave Lewis

There are things in this world that are far less enjoyable than having your website knocked offline to be certain. That being said, it can have a massive impact to your day or that of a company trying to make a living by selling their wares online.

China Hack Of U.S. Government Gave Unprecedented Access

The New York Times | Posted 06.20.2015 | Politics

For more than five years, American intelligence agencies followed several groups of Chinese hackers who were systematically draining information from ...

Travis Waldron

The Controversial Law At The Heart Of The Cardinals' Hacking Case

HuffingtonPost.com | Travis Waldron | Posted 06.16.2015 | Sports

The FBI and Justice Department are investigating whether St. Louis Cardinals employees illegally hacked into networks owned and operated by the Housto...

Nearly 400,000 Homeland Security Employees May Have Had Private Data Compromised

AP | ALICIA A. CALDWELL | Posted 06.15.2015 | Politics

WASHINGTON (AP) — As many as 390,000 current and former Homeland Security Department employees, contractors and job applicants may have had their pr...

Cyber Attacks: Making Government Information Safe

Rebecca Abrahams | Posted 06.12.2015 | Politics
Rebecca Abrahams

There are three reasons why the situation is so dire and why it was a piece of cake for hackers to rip off more than 4 million personnel records from the little known but important Office of Personnel Management (OPM).

The Big Issue Apple Needs to Address

S. Kumar | Posted 06.09.2015 | Technology
S. Kumar

There is one area in which Apple and Cook are being coy and its time for Americans to call the tech giant out on that.

Senate Panel Says Recent White House Data Breach Contained Personal Information

Reuters | Peter Cooney | Posted 05.03.2015 | Politics

WASHINGTON, May 3 (Reuters) - The U.S. Senate Commerce Committee has written President Barack Obama over concerns that a recently reported data breach...

Viruses, Hacking and Hoaxes: The Unfortunately Unethical Side of the Internet

Rabbi Jason Miller | Posted 06.29.2015 | Religion
Rabbi Jason Miller

Unethical abuse of communication is not new. The rabbinic scholar, Rabbeinu Gershom, lived a thousand years ago and was considered one of the earliest and greatest scholars of the Ashkenazi Jewish community.

Pentagon Says Global Cyber Threat Is Growing

Reuters | Phil Stewart | Posted 06.23.2015 | Politics

PALO ALTO, California, April 23 (Reuters) - The United States on Thursday disclosed a cyber intrusion this year by Russian hackers who accessed an un...

5 Ways You Can Hack Technology for Social Change

Craig Newmark | Posted 06.22.2015 | Technology
Craig Newmark

With winter melting, and spring coming into view, lots of folks are re-emerging and looking to get involved. My team and I generated a list of 5 ways to get involved in tech this spring.

The Top 8 Cheapest Flight Destinations in the EU: Summer 2015

Hipmunk | Posted 06.17.2015 | Travel
Hipmunk

It's late afternoon. Chances are you're staring into space and not wanting to do work. So, let us help you do something productive; plan out your optimal summer vacation.

IBM Uncovers Sophisticated Cyber Scam 'Dyre Wolf'

Reuters | Posted 06.02.2015 | Technology

By Bill Rigby SEATTLE (Reuters) - IBM has uncovered a sophisticated fraud scheme run by a well- funded Eastern European gang of cyber cr...

Ryan Grim

Retailers Push For Delay In Implementing New Data Security Features

HuffingtonPost.com | Ryan Grim | Posted 04.03.2015 | Politics

WASHINGTON -- Retail and grocery stores around the country are asking to delay implementation of new security features for credit and debit purchases ...