iOS app Android app

Internet Security

Secret Service Laptop Holding Trump Tower Floor Plans Stolen From Agent's Car

The Huffington Post | Sebastian Murdock | Posted 03.17.2017 | Politics

A laptop computer containing Trump Tower floor plans and other sensitive intelligence was stolen from a Secret Service agent’s parked vehicle in New...

The Vice President Got Phished — Are You Next?

Adam Levin | Posted 03.09.2017 | Technology
Adam Levin

America got mail this weekend, about 30 emails, according to reports. They were written as recently as last year by then-Governor Mike Pence and sent ...

Ransomware Attack Locks Democratic State Senators Out Of Their Computers

The Huffington Post | Paul Blumenthal | Posted 03.08.2017 | Politics

WASHINGTON ― A ransomware attack has frozen Democrats in the Pennsylvania state Senate out of their computers, data, email and website. The attack, ...

In New CIA WikiLeaks Trove, ¯\_(⊙︿⊙)_/¯, (◕_◕) And ᶘ ᵒᴥᵒᶅ

The Huffington Post | Nick Visser | Posted 03.08.2017 | Politics

WikiLeaks released what may be the largest drop of CIA documents in history on Tuesday, 8,700 pages that appear to describe the spy agency’s far-rea...

If You Have One Of These Toys In Your House, You May Want To Stop Using It

The Huffington Post | Ryan Grenoble | Posted 02.27.2017 | Business

Sloppy data security practices at a toy company that sells a line of internet-connected stuffed animals has exposed the personal information of more t...

In A World Without Secrets, Here's How To Almost Disappear Online

Christopher Elliott | Posted 02.24.2017 | Technology
Christopher Elliott

It may only be a slight exaggeration that companies know more about you than you do about yourself.Fire up your cell phone or laptop if you have any d...

The Most Common Passwords In 2016 Are Truly Terrible

The Huffington Post | Nina Golgowski | Posted 01.18.2017 | Technology

Cybersecurity is on many people’s minds these days, and yet using “password” as a password is apparently still a thing. On Friday, password mana...

Trump's Attitude Toward Hacking Raises Concerns Among Cybersecurity Experts

The Huffington Post | Mary S Papenfuss | Posted 01.03.2017 | Politics

President-elect Donald Trump’s stance on cybersecurity could be a dangerous go-ahead signal for hackers that may threaten America’s safety, busine...

Code Associated With Russia Hacking Found On Vermont Utility Computer

Reuters | Paul Vale | Posted 12.31.2016 | Politics

A code associated with a broad Russian hacking campaign dubbed Grizzly Steppe by the Obama administration has been detected on a laptop associated wit...

Leaked Snowden Document Hints At Why Feds Are So Sure Russia Hacked U.S. Election

The Huffington Post | Mary S Papenfuss | Posted 01.02.2017 | Politics

U.S. intelligence officials appear certain that Russia was responsible for interfering in the presidential election — though they haven’t fully de...

Genius 6-Year-Old Uses Sleeping Mom's Thumbprint To Buy Presents On Amazon

The Huffington Post | Jenna Amatulli | Posted 12.27.2016 | Weird News

There are child prodigies and then there’s Ashlynd Howell ― a 6-year-old with some serious moxie. In a Wall Street Journal article on how online s...

How Will Internet Security Threats Change Over the Coming Years?

Quora | Posted 12.22.2016 | Technology

What do you see as the major type of security threats in the coming 5-10 yrs as PC sales have declined and mobile nodes or IOT devices will explode? o...

Report: Russian Hackers Who Targeted DNC Also Tracked Ukrainian Artillery Units

Reuters | Paul Vale | Posted 12.22.2016 | Home

A hacking group linked to the Russian government and high-profile cyber attacks against Democrats during the U.S. presidential election likely used a ...

Identity Protection And Security Tips For Holiday Shopping & More

Mark Steber | Posted 12.12.2016 | Business
Mark Steber

Around this time of year, I'd rather focus on family and fun than identity protection, security, and taxes, but as they say "tis the season." If I lea...

Are You Giving Hackers a Present This Holiday?

Adam Levin | Posted 12.08.2016 | Technology
Adam Levin

In October 2016, there was a distributed denial of service (DDoS) attack that caused serious traffic issues at major internet destinations like Amazon...

Improving Your Online Privacy: The 5 Best VPN Services Compared

Toby Nwazor | Posted 09.13.2016 | Technology
Toby Nwazor

Credit Concerns about surveillance and cybercrime have risen in recent years, and more people are looking to VPNs to boost their internet privacy and...

6 Reasons Every Internet-Based Business Person Needs To Use VPN

Toby Nwazor | Posted 08.16.2016 | Technology
Toby Nwazor

Everyone agrees that it is necessary to protect data and sensitive information that is shared on and over the internet.

The True Cost of Online Crime

John Powers | Posted 05.27.2016 | Technology
John Powers

Photo Credit: User:Colin / Wikimedia Commons / CC-BY-SA-4.0 You can't believe everything you read on the Internet. That's a lesson I learned long bef...

Is This The Best Wi-Fi Router Ever?

Stewart Wolpin | Posted 05.10.2016 | Technology
Stewart Wolpin

Does your home Wi-Fi suck? If it does (and it probably does), it could be you're not getting enough megs from your internet service provider (ISP). If...

Why 2016 Will Be an Even Scarier Year for Internet Security

Rami Essaid | Posted 01.26.2017 | Technology
Rami Essaid

The holiday decorations had barely been returned to the attic when 2016 already saw its first high-profile cyber attack. Time Warner Cable said on Jan...

Can Smart TVs Be Hacked?

Quora | Posted 12.17.2016 | Technology

As part of my job as a security response researcher in Symantec, I recently got a chance to experiment on a new generation smart TV to see how well it was secured against attacks. I quickly realized, that after a successful attack, I was looking at an ultimately unusable brand new TV infected with ransomware.

How To Hide An Identity In Plain Sight

Quora | Posted 11.10.2016 | Technology

To really hide online, you need to do it in plain sight. That means you will have to create an entire fake online persona -- on Facebook. Google, Twitter, even LinkedIn -- using this identity. Do not link any of those accounts to your actual identity or your real email address.

Understanding the Benefits and Limits of Internet Anonymity

Jonha Revesencio | Posted 10.15.2016 | Business
Jonha Revesencio

As much as possible, never use simple passwords or, worse, use the same one on all of your accounts. Even if they are complicated, some websites have less security in protecting passwords. It is hard to memorize many passwords, but this is for your own good and the protection of your identity.

Online Security: The Fundamental American Right of the 21st Century

Emmanuel Schalit | Posted 06.30.2016 | Technology
Emmanuel Schalit

Here in America, there is an unquestioned belief in the fundamental right to safety. It is built into the legal framework, and thus culture of America, that every citizen has the inalienable right to be protected from physical violence.

Treading Carefully in the 21st Century: The V.P.N.

Alex Simon | Posted 06.19.2016 | Technology
Alex Simon

As a result of the World Wide Web becoming the 21st century version of Central Park after midnight, increased security protocols have been invented and initiated. One of the most reliable and frequently used is the Virtual Private Network.