iOS app Android app

Computer Security

Hey, Corporate Director!

Edward Guiliano, Ph.D. | Posted 10.21.2014 | Technology
Edward Guiliano, Ph.D.

The campaign to stop cyber-crime begins with educating the next wave of professionals, but ongoing education and idea exchange are the ultimate keys to confronting cybercrime on the ground and in the boardroom.

Google Uncovers Bug In Widely Used Web Encryption Technology

Reuters | Jim Finkle | Posted 10.14.2014 | Technology

By Jim Finkle BOSTON, Oct 14 (Reuters) - Three Google Inc researchers have uncovered a security bug in widely used web encryption technology that t...

Gerry Smith

Apple Joins Rush To Fix Shellshock Bug Infecting The Internet

HuffingtonPost.com | Gerry Smith | Posted 09.26.2014 | Technology

Apple said Friday that it was fixing a security flaw in some versions of its operating system for Mac computers, joining other tech companies that are...

New Security Bug May Be As Serious As 'Heartbleed'

Reuters | Jim Finkle | Posted 09.26.2014 | Technology

By Jim Finkle BOSTON, Sept 25 (Reuters) - Hackers have launched attacks exploiting the newly identified "Shellshock" computer bug, researchers warn...

New Software Bug May Be Worse Than 'Heartbleed'

Reuters | Posted 11.24.2014 | Technology

By Jim Finkle BOSTON (Reuters) - A newly discovered security bug in a widely used piece of Linux software, known as "Bash," could pose a...

What Are Some Computer Hacks That Hackers Know But Most People Don't?

Quora | Posted 07.19.2014 | Home
Quora

This question originally appeared on Quora: What are some computer hacks that hackers know but most people don't?. Answer by Kevin Borders, Former...

How I Took My Hobby To The Next Level

Arlan Jaska | Posted 12.02.2013 | Teen
Arlan Jaska

Getting hands-on experience in what we were interested in could be seen as immoral, and perhaps more importantly, illegal. But how can you learn to secure a system if you don't understand how it can be attacked?

Gitmo Logistics & DoD Computer Mess Likely to Delay 9/11 Case

Daphne Eviatar | Posted 11.20.2013 | World
Daphne Eviatar

Witnesses provided more details of the Defense Department's computer mess-ups and confidentiality breaches in the 9/11 hearings on Friday, and defense lawyers renewed their request to delay the hearings until those problems could be resolved.

And What's Your Mother's Maiden Name?

Neale Godfrey | Posted 11.12.2013 | Fifty
Neale Godfrey

dentity theft can be accomplished as simply as someone getting information from your charge receipt or stealing your credit card. But, as more safeguards have been implemented, thieves have become more sophisticated.

60 Days of Hacker Assaults

Hemanshu Nigam | Posted 05.05.2013 | Technology
Hemanshu Nigam

Although the average computer user has little involvement with such significant security threats, the increasing prevalence of cybercrime places greater responsibility on consumers to protect their individual identities and personal information from hackers.

The Content Brief: What's Up With All the Hacking?

Shawn Amos | Posted 04.24.2013 | Technology
Shawn Amos

Is there a hacking epidemic? Earlier this week, Burger King saw its Twitter account get a McDonald's makeover, and then Jeep had its feed taken over b...

Oracle Issues Java Fix, But Is Still In Hot Water

AP | RYAN NAKASHIMA | Posted 03.16.2013 | Technology

LOS ANGELES — Oracle Corp. said Monday it has released a fix for the flaw in its Java software that raised an alarm from the U.S. Department of ...

Intel, McAfee Look to Redefine Consumer Security

Jeff Hindenach | Posted 03.09.2013 | Technology
Jeff Hindenach

At the Consumer Electronics Show today, Intel and McAfee announced new technology that they've been developing over the past year. The announcement couldn't come at a better time for McAfee, which spent much of December trying to distance itself from bad press surrounding its founder.

Gerry Smith

Hackers Reveal 'Mission Impossible' Security Tricks To Avoid Getting Hacked

HuffingtonPost.com | Gerry Smith | Posted 12.20.2012 | Technology

When Adrian Lamo goes online, he leaves nothing to chance. To log in to personal accounts, he uses a digital password generator -- a plastic key ch...

Gerry Smith

Mideast Computer Virus Highlights Iran's Cyber Focus, Experts Say

HuffingtonPost.com | Gerry Smith | Posted 10.24.2012 | Technology

In recent weeks, computer hackers have attacked a Saudi Arabian oil company, a Qatari natural gas company, and several American banks. The level of da...

What Star Wars Teaches Us About Computer Security

Sean Michael Kerner | Posted 10.18.2012 | Technology
Sean Michael Kerner

Many have found inspiration and solace in Star Wars that can apply to the everyday real world, including data security. It teaches us that it is important to protect all the important data that you have with core access control.

Startling Percentage Of Computer Users Are 'Pirates'

The Huffington Post | Britney Fitzgerald | Posted 06.01.2012 | Technology

Are you a software pirate? 57 percent of the world's computer users confess to pirating software according to a recent Business Software Alliance (BSA...

Is It Possible for Hackers to Access My Computer's Webcam?

Quora | Posted 07.07.2012 | Technology
Quora

This question originally appeared on Quora. By Feross Aboukhadijeh, Stanford undergraduate, computer security enthusiast, and blogger Yes, bad guy...

Do Journalists Use Enough Security To Protect Their Sources?

nytimes.com | CHRISTOPHER SOGHOIAN | Posted 12.27.2011 | Media

BRAVE journalists have defied court orders and have even been jailed rather than compromise their ethical duty to protect sources. But as governments ...

U.S. Reportedly Debated Cyberwarfare Against Libya

The New York Times | ERIC SCHMITT and THOM SHANKER | Posted 12.17.2011 | World

Just before the American-led strikes against Libya in March, the Obama administration intensely debated whether to open the mission with a new kind of...

U.S. Warned To Develop New Technology To Counter Cyber Threats

AP | By LOLITA C. BALDOR | Posted 11.12.2011 | Technology

WASHINGTON -- A new study warns that the U.S. must develop cyber intelligence as a new and better coordinated government discipline that can predict c...

Report Uncovers Widespread Cyber Attacks

AP | BARBARA ORTUTAY | Posted 10.02.2011 | Technology

NEW YORK — A computer security firm says cybercriminals have spent at least the past five years targeting more than 70 government entities, nonp...

Gerry Smith

Apple Laptop Flaw Found In Unlikely Place

HuffingtonPost.com | Gerry Smith | Posted 09.21.2011 | Technology

A security researcher claims to have found a new security flaw in Apple laptops that could allow hackers to ruin laptop batteries, infect them with ma...

Computer "Security"

Andrew Reinbach | Posted 08.19.2011 | Technology
Andrew Reinbach

Right now, you're sitting in front of our pact with the Devil. When you finish reading this, you will do nothing about it.

DK Matai | Posted 05.25.2011 | Technology
DK Matai

Editor's Note: This post has been removed from the Huffington Post....