iOS app Android app


6 Ways You Might Get Hacked This Holiday Season

Jason Glassberg | Posted 11.10.2015 | Technology
Jason Glassberg

As someone who works in the cybersecurity industry, I know that the November to December timeframe is when many consumers and businesses will get hacked or defrauded. In many ways, the holiday season is an ideal time for cybercriminals.

Trans Hacking Startup Land: Gender Performance and Deception

Alyx Baldwin | Posted 10.26.2015 | Gay Voices
Alyx Baldwin

After I moved away from being gender ambiguous, I unbound myself and started presenting as a queer woman. I reached out to many LGBTQ* startup allegiances for help with fundraising. That was where I met more hostility than ever before.

Apple, Facebook Come Out Against Controversial Cybersecurity Bill

Reuters | Lorenzo Ligato | Posted 10.22.2015 | Technology


Sony Pictures To Pay Up To $8 Million In Hacking Lawsuit

AP | Alexandra Ma | Posted 10.20.2015 | Technology

LOS ANGELES (AP) — Sony Pictures Entertainment has reached a settlement with current and former employees, agreeing to pay up to $8 million to ...

Q and A With Charlotte Laws About Her Romance With Tom Jones and Her Memoir, "Rebel in High Heels"

Charlotte Laws | Posted 10.20.2015 | Entertainment
Charlotte Laws

My new memoir, Rebel in High Heels, chronicles my life, including my battle against revenge porn, my party crashing escapades and my three-year relationship with singer Tom Jones.

Facebook Will Now Alert You If A Country Is Trying To Hack You

The Huffington Post | Alexander Howard | Posted 10.19.2015 | Technology

Facebook will now send you a warning notice if it thinks your account has been "targeted or compromised by an attacker" associated with...

Pre-Holiday Cybersecurity Checklist for SMBs

Jason Glassberg | Posted 10.15.2015 | Business
Jason Glassberg

The holiday shopping season is just around the corner, but businesses aren't the only ones that will be profiting from the uptick in consumer spending - cybercriminals will be making plenty of money too.

Our Main Weapon Against Hackers Is A 30-Year-Old Law

The Huffington Post | Ryan Grenoble | Posted 10.09.2015 | Technology

(function(){var src_url="

Inside The Hunt For The Uber Hacker

Reuters | Alexandra Ma | Posted 10.08.2015 | Technology

SAN FRANCISCO, Oct 8 (Reuters) - Eight months after disclosing a major data breach, ride service Uber is focusing its legal efforts on learning more ...

Baby Monitors: Who's Really Watching Your Baby?

Todd R. Miller | Posted 10.05.2015 | Technology
Todd R. Miller

Increasingly, the virtual world of the Internet is converging with the physical world through the Internet of Things. As more physical devices connect to the Internet, hackers' reach and breadth expands exponentially. Today, Internet-enabled devices include TVs, home security systems, kitchen appliances, thermostats, and more.

Cyber Threats to Your Business: 4 Ways to Safeguard Your Assets

John Bowen | Posted 10.05.2015 | Business
John Bowen

Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.

HACKED: Personal Info On 15 Million T-Mobile Customers Exposed

Reuters | Jade Walker | Posted 10.02.2015 | Technology

(function(){var src_url="

Aaron Sorkin Slams Sony Hack As 'Terrorism'

The Huffington Post | Joe Satran | Posted 09.29.2015 | Entertainment

Aaron Sorkin is still mad about the Sony hack. Almost a year has passed since a group of hackers tied to the North Korean government infiltrated...

How Easy Is It to Hack Your Baby's Monitor? Very Easy!

Christopher Burgess | Posted 09.24.2015 | Parents
Christopher Burgess

In a classic case of unintended consequences, manufacturers of today's video and audio baby monitors are wishing they had thought a bit more about the security and privacy afforded to their products.

The Medical Identity Theft Apocalypse? Fear the Walking Files

Adam Levin | Posted 09.17.2015 | Technology
Adam Levin

Criminal cyber attacks on health care information repositories have increased 125 percent since 2010. With the announcement of the Excellus breach last week, the total number of big-headline medical information compromises reported in 2015 had crossed the mind-blowing demarcation line of 100 million files.

9 Giant Banks Make a Deal on Blockchain: What It Means

Alex Salkever | Posted 09.16.2015 | Technology
Alex Salkever

A blockchain is public ledger of transactions that is distributed among all participants in a market or system. Each transaction that happens within a market or system must be verified by a strong majority of participants. It's very difficult to falsify transactions in a blockchain because each transaction generates a strong cryptographic signature.

The OPM Hack, Big Data and You: Could China Influence the 2016 Election?

Peter B. LaMontagne | Posted 09.15.2015 | Politics
Peter B. LaMontagne

The OPM hack put them even further ahead by identifying 21 million American adults that have applied to work for the Federal government. No doubt espionage for China will remain the primary use for this data, but just as we update our view of identity in the 21st century so too might the PRC update its plans the use of such data.

Ashley Madison -- Teflon Brand or Burnt Toast?

Greg Portell | Posted 09.03.2015 | Business
Greg Portell

The Ashley Madison hack is putting the notion that "any press is good press" to the test. While the fall out clutters courtrooms around the country, the core brand of Ashley Madison will illustrate how a brand dies in the digital age.

Automobile Hacking: The Downside of Self-Driving Cars

Grace Ji-Sun Kim | Posted 09.03.2015 | Technology
Grace Ji-Sun Kim

As cars continue to rely on computers to increase capabilities, it leaves open to the possibility that any car can be hacked. A simple malware program in a car's software can cause havoc on the roads and ultimately take the lives of many people.

Millions Affected By The U.S. Government Hack Haven't Been Told Yet

Reuters | Alana Horowitz | Posted 09.02.2015 | Politics

WASHINGTON — The U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data wa...

Privacy Is Dead: What You Still Can Do to Protect Yourself

Adam Levin | Posted 08.27.2015 | Technology
Adam Levin

In the absence of instant security gratification at a time when breaches have become the third certainty in life and consumers are the product -- how do we better protect ourselves?

Life After Ashley Madison: How to Operate in a World Without Secrets

Adam Levin | Posted 08.20.2015 | Technology
Adam Levin

Data breaches have become the third certainty in life, right behind death and taxes. Up to now, the kind of information most often exposed in a breach was of concern because it could be used to harm our financial lives and even our well being (like medical identity theft). What differentiates the ALM hack is that it has moral ramifications.

Mom, the Selectric, and the IoT for Health

Jane Sarasohn-Kahn | Posted 08.12.2015 | Healthy Living
Jane Sarasohn-Kahn

Might Rosie the Robot boss Jane Jetson around? Could a Jeep get hacked? A so-called "smart" front door lock keep a homeowner locked out for a ransom? ...

Russia Reportedly Hacked Pentagon Email System

The Huffington Post | Mollie Reilly | Posted 08.06.2015 | Politics

U.S. officials say a recent attack on an unclassified Pentagon email server that has caused the system to shut down for nearly two weeks was carried ...

Are Elite Credit Cards Most Vulnerable to Hackers?

CompareCards | Posted 07.29.2015 | Money

The crooks always seem to be one step ahead of the security features and many cardholders are now wondering if there is anything they can do to take the target off their backs. Here are a few tips to consider that might help you fly under the radar of today's cyber criminals.