iOS app Android app


How Easy Is It to Hack Your Baby's Monitor? Very Easy!

Christopher Burgess | Posted 09.22.2016 | Parents
Christopher Burgess

In a classic case of unintended consequences, manufacturers of today's video and audio baby monitors are wishing they had thought a bit more about the security and privacy afforded to their products.

The Medical Identity Theft Apocalypse? Fear the Walking Files

Adam Levin | Posted 09.17.2016 | Technology
Adam Levin

Criminal cyber attacks on health care information repositories have increased 125 percent since 2010. With the announcement of the Excellus breach last week, the total number of big-headline medical information compromises reported in 2015 had crossed the mind-blowing demarcation line of 100 million files.

9 Giant Banks Make a Deal on Blockchain: What It Means

Alex Salkever | Posted 09.16.2016 | Technology
Alex Salkever

A blockchain is public ledger of transactions that is distributed among all participants in a market or system. Each transaction that happens within a market or system must be verified by a strong majority of participants. It's very difficult to falsify transactions in a blockchain because each transaction generates a strong cryptographic signature.

The OPM Hack, Big Data and You: Could China Influence the 2016 Election?

Peter B. LaMontagne | Posted 09.10.2016 | Politics
Peter B. LaMontagne

The OPM hack put them even further ahead by identifying 21 million American adults that have applied to work for the Federal government. No doubt espionage for China will remain the primary use for this data, but just as we update our view of identity in the 21st century so too might the PRC update its plans the use of such data.

Ashley Madison -- Teflon Brand or Burnt Toast?

Greg Portell | Posted 09.03.2016 | Business
Greg Portell

The Ashley Madison hack is putting the notion that "any press is good press" to the test. While the fall out clutters courtrooms around the country, the core brand of Ashley Madison will illustrate how a brand dies in the digital age.

Automobile Hacking: The Downside of Self-Driving Cars

Grace Ji-Sun Kim | Posted 09.02.2016 | Technology
Grace Ji-Sun Kim

As cars continue to rely on computers to increase capabilities, it leaves open to the possibility that any car can be hacked. A simple malware program in a car's software can cause havoc on the roads and ultimately take the lives of many people.

Millions Affected By The U.S. Government Hack Haven't Been Told Yet

Reuters | Alana Horowitz | Posted 09.02.2015 | Politics

WASHINGTON — The U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data was ha...

Privacy Is Dead: What You Still Can Do to Protect Yourself

Adam Levin | Posted 08.27.2016 | Technology
Adam Levin

In the absence of instant security gratification at a time when breaches have become the third certainty in life and consumers are the product -- how do we better protect ourselves?

Life After Ashley Madison: How to Operate in a World Without Secrets

Adam Levin | Posted 08.19.2016 | Technology
Adam Levin

Data breaches have become the third certainty in life, right behind death and taxes. Up to now, the kind of information most often exposed in a breach was of concern because it could be used to harm our financial lives and even our well being (like medical identity theft). What differentiates the ALM hack is that it has moral ramifications.

Mom, the Selectric, and the IoT for Health

Jane Sarasohn-Kahn | Posted 08.11.2016 | Healthy Living
Jane Sarasohn-Kahn

Might Rosie the Robot boss Jane Jetson around? Could a Jeep get hacked? A so-called "smart" front door lock keep a homeowner locked out for a ransom? ...

Russia Reportedly Hacked Pentagon Email System

The Huffington Post | Mollie Reilly | Posted 08.06.2015 | Politics

U.S. officials say a recent attack on an unclassified Pentagon email server that has caused the system to shut down for nearly two weeks was carried o...

Are Elite Credit Cards Most Vulnerable to Hackers?

CompareCards | Posted 07.29.2016 | Money

The crooks always seem to be one step ahead of the security features and many cardholders are now wondering if there is anything they can do to take the target off their backs. Here are a few tips to consider that might help you fly under the radar of today's cyber criminals.

10 Industries That Could Profit From The Ashley Madison Hack

Adam Levin | Posted 07.24.2016 | Technology
Adam Levin

There are other industries that may well get a rise in the wake of the Ashley Madison hack. Here are 10 of the tragic winners.

We Need To Protect Drivers' Privacy As We Connect Cars To The Internet, Sen. Blumenthal Says

The Huffington Post | Alexander Howard | Posted 07.22.2015 | Technology

Connecting a car to the Internet raises different concerns than putting sensors, appliances, parking meters or thermostats online. That's why Sens. Ed...

Hackers Hijacked A Jeep With A Reporter Inside, And 5 Other Scary Hacks

The Huffington Post | Ryan Grenoble | Posted 01.03.2017 | Technology

Jeepers creepers! It's time to take security on the "Internet of things" seriously. Wired reporter Andy Greenberg recently asked two hackers to prove...

Senate Bill Aims To Lock Hackers Out Of Connected Cars

The Huffington Post | Alexander Howard | Posted 07.21.2015 | Technology

The road to our connected future may be paved with good intentions, but it may not be secure enough to drive on. As reporter Andy Greenberg recently d...

Forget Ashley Madison! Any Website Can Arrange An Affair

The Huffington Post | Aaron Nemo | Posted 07.21.2015 | Comedy

By now, you've heard about the hacking of Ashley Madison, a website designed to help married men and women cheat on their spouses. So, what now? Are t...

Reputation Control + Cybersecurity Hurt In OPM Hack

Alan W. Silberberg | Posted 07.15.2016 | Technology
Alan W. Silberberg

Reputation. It is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke.

What to do if Someone Files a False Tax Return in Your Name

Nathaniel Sillin | Posted 07.09.2016 | Business
Nathaniel Sillin

Few things cause more concern than a letter in the mail from the Internal Revenue Service (IRS). Though the agency sends out letters or notices for many reasons, identity theft is one of the fastest-growing issues for the IRS.

When It Comes To Identity Theft, How Paranoid Should You Be?

Dr. Gregory Jantz, Ph.D. | Posted 07.06.2016 | Technology
Dr. Gregory Jantz, Ph.D.

Being in the therapy business, I'm constantly monitoring my own psychological state, probably not unlike physicians who regularly check their pulse. Lately, I'm monitoring a growing sense of being watched. I don't think I'm becoming paranoid, yet, but it's starting to feel that way.

Suggestions for Political Campaigns Using the Latest Digital Tools

Rebecca Abrahams | Posted 07.01.2016 | Technology
Rebecca Abrahams

Today's political campaigns are using the latest digital tools. Since the presidential race is in full swing, we thought we'd be extra patriotic this Fourth of July and offer free advice as to how the campaigns can protect against cyber breaches and take downs.

The Real Cybercrime

Rebecca Abrahams | Posted 06.25.2016 | Technology
Rebecca Abrahams

It now seems that the Office of Personnel Management, which had outsourced its data storage to other Federal agencies, has lost an astonishing 18 million personnel records, including most of those involving security clearances.

How Hackable Are Cars?

Quora | Posted 06.16.2016 | Technology

Like a lot of computer/software security discussions, there's "the realm of possibility" and then there's the real world.

DDoS Attacks Have Graduated to Extortion

Dave Lewis | Posted 06.22.2016 | Technology
Dave Lewis

There are things in this world that are far less enjoyable than having your website knocked offline to be certain. That being said, it can have a massive impact to your day or that of a company trying to make a living by selling their wares online.

China Hack Of U.S. Government Gave Unprecedented Access

The New York Times | Posted 06.20.2015 | Politics

For more than five years, American intelligence agencies followed several groups of Chinese hackers who were systematically draining information from ...