A debit card from your business, in the virtual hands of a thief, spells a mountain of trouble. The thief can generate a duplicate of your business debit card, then splurge. A “cloned” card can be swiped in a card reader, appearing legitimate.
co-authored by Dr. Stephen Bryen, Chairman & CTO, Ziklag Systems Encryption is becoming a big deal these days and some of the top companies are imp...
Defining and fostering cyber peace is no easy feat; in fact, it has been said that "achieving and maintaining cyber-peace can be as demanding as starting a cyberwar."
What we tend to forget is that ultimately, the responsibility of privacy management does not rest solely on the shoulders of technology companies; it rests on consumers too.
Is it coincidence that Beth Jacob CIO resigned from her job as chief information officer of Target Corporation? Or could this possibly be connected to...
Today, data breaches at major retailers like Target have made cybercrime front page news. With ubiquitous computing, you cannot let your guard down for even a moment, especially when hackers are increasingly targeting bank and brokerage accounts.
Capital One is leading the way for banks helping customers smoke out potentially invalid charges. Capital One's service is free, called Second Look. S...
Treat cyber security as a business problem, not a technical problem.
Most smartphones -- Android, iPhone, Windows phones, are made in China. How many of them have Trojans lurking inside?
For the sake of America's economy and consumers, we must take steps to make sure consumer financial information is safe from cybercriminals.
Yes, Google has a responsibility to parents and the people to keep the cyber-world safer. Google is the number one search engine. We made them that, and in return, shouldn't they help create a safer net?
Many of us -- myself included -- carry our mobile phones with us everywhere. But even as we have become so reliant on mobile phones, most of us don't pay close attention to our phone bills. And if you aren't reading your bill, it could really cost you.
PIN may sometimes stand for pilfered identification number if a hacker gets yours. And it's easier than ever for thieves to get your PIN from an ATM, coming up with clever ways to beat security technology.
The Silicon Valley tech giants want to reform government surveillance on the Internet? That's what they say, anyway.
For kids, summer means freedom and spending time with friends but that extra time on their hands can also mean more time to find trouble and where else but on the internet?