iOS app Android app


Cyber Attack: Coming to a Store Near You

Rebecca Abrahams | Posted 09.17.2014 | Business
Rebecca Abrahams

BigPill Drug stores began in 1960 and grew to 35 stores by 1990. The company had more than 100 stores in 2000. It is now a publicly traded company, w...

5 Million Gmail Usernames And Associated Passwords Leaked

The Huffington Post | Alexis Kleinman | Posted 09.12.2014 | Technology

It's time to change your Gmail password -- again. Around 5 million Gmail usernames and associated passwords were leaked on a Russian Internet foru...

How to Secure Your iCloud

Robert Siciliano | Posted 09.08.2014 | Technology
Robert Siciliano

By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app.

Botnets Here, Botnets There, Botnets EVERYWHERE

Robert Siciliano | Posted 09.08.2014 | Huffpost Code
Robert Siciliano

What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybercrime ring.

Researchers say your Mobile Carrier's Network isn't all that Secure

Robert Siciliano | Posted 09.08.2014 | Technology
Robert Siciliano

Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into.

Gerry Smith

If You're Not Famous, Good Luck Getting Reddit To Take Down Your Nude Photos | Gerry Smith | Posted 09.09.2014 | Technology

The social news site Reddit took down a forum over the weekend that spread stolen naked photos of celebrities like Jennifer Lawrence and Kate Upton, s...

4 Identity Protection Habits Every College Student Should Have

Robert Siciliano | Posted 09.08.2014 | Money
Robert Siciliano

It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age.

Technology Companies Need To Take Responsibility And Give Us A Better Default

Tarun Wadhwa | Posted 09.07.2014 | Technology
Tarun Wadhwa

It's no longer a surprise to hear that a major company has had their customers' personal information compromised. Every day identity theft becomes mor...

Give Me $46 Billion and I will Build a Safe Computer System

Rebecca Abrahams | Posted 09.05.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, Founder & Chairman Ziklag Systems ABI Research estimates that cyber security spending on the critical infrastructur...

Are Those Security Questions Begging You to Lie?

Adam Levin | Posted 09.05.2014 | Technology
Adam Levin

As the smoke clears from this latest attack on privacy and our collective sense of decency, it's becoming more and more likely that a deft use of personally identifiable information was used to unlock the nude celebrity photo troves that flooded the Internet.

The Bigger Issue: Will Americans Ever Get Past Their Peeping Tom Mentality?

Lorraine Devon Wilke | Posted 09.03.2014 | Entertainment
Lorraine Devon Wilke

Jokes are made about the salivating, ugly Americans ogling topless sunbathers at European beaches, but the schizophrenic nature of our country's relationship with sex has passed from laughable to lamentable to downright detrimental.

What the Hacker Scandal Means for Society

Katrina Sands | Posted 09.03.2014 | Entertainment
Katrina Sands

Why do we normalize forced and involuntary pornography of women? Why do we consistently participate in the exploitation of women, and why do we turn the ownership of the female body into a spectator sport?

Majority of Executives Believe Attackers Will Overcome Corporate Defenses

Robert Siciliano | Posted 09.02.2014 | Business
Robert Siciliano

Many technology executives don't have a favorable outlook on their ability to sideswipe cybercriminals, according to research conducted by McKinsey and World Economic Forum.

What I Want My Kids to Learn From the Jennifer Lawrence Hacking Scandal

Angela Keck | Posted 09.02.2014 | Parents
Angela Keck

From the moment that my children had access to things like camera phones or laptops with webcams, I have had numerous conversations about how any photo you take can be shared, and anything that is shared can be seen by the entire world.

How To Keep Your iPhone Photos Safe, In 3 Steps

The Huffington Post | Alexis Kleinman | Posted 09.02.2014 | Technology

After a huge number of nude celebrity photos were leaked over the weekend, you should take a moment to ensure the photos that you have on your phone a...

Family Identity Theft Is Ugly

Robert Siciliano | Posted 08.29.2014 | Technology
Robert Siciliano

It's easy, for instance, for a parent to access their child's name and Social Security number, then open up a phony account--even if the victim is literally a child. Most companies don't check the ages, so that's why this crime can go undetected for years.

Best Way to Destroy a Computer Virus

Robert Siciliano | Posted 08.28.2014 | Technology
Robert Siciliano

You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats.

Russian Hackers Said to Loot Gigabytes of Big Bank Data

Bloomberg | Posted 08.28.2014 | Business

Russian hackers attacked JPMorgan Chase & Co. and at least four other banks this month in a coordinated assault that resulted in the loss of gigabytes...

Cybersecurity Insurance Still Requires Cybersecurity

Robert Siciliano | Posted 08.24.2014 | Technology
Robert Siciliano

OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced.

More Than 1,000 U.S. Retailers May Have Been Hacked

AP | ALICIA A. CALDWELL and JEFF HORWITZ | Posted 08.22.2014 | Business

WASHINGTON (AP) — More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hacker...

Before Getting Rid of Your Old Printer, Say 'Goodbye' to Lingering Data

Robert Siciliano | Posted 08.22.2014 | Technology
Robert Siciliano

Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and credit card numbers. But there are other devices that hold sensitive data that we don't really talk about. For example, printers.

Beware of the Lottery Scam

Robert Siciliano | Posted 08.19.2014 | Crime
Robert Siciliano

There's one born every minute. Many scammers use the names of valid lottery organizations, but this doesn't mean the legit entities are involved. The latest con is to tell someone they won a Powerball jackpot while planning on stealing their identity.

What Do I Need to Know and When Do I Need to Know It?

Brian E. Finch | Posted 08.14.2014 | Technology
Brian E. Finch

Another day, another big hack discovered. According to reports from the New York Times, the WSJ, and numerous other publications, a small group of cyber criminals based out of Russia were apparently able to collect around 1.2 billion usernames and passwords from more than 400,000 websites globally.

Healthcare Providers Gaining Trust by Marketing Security

Robert Siciliano | Posted 08.12.2014 | Business
Robert Siciliano

You’ve surely heard of “B2B” or business-to-business marketing. The new game plan is “B2C” – business to consumer ...

8 Ways to Bullet Proof Your Social Accounts

Robert Siciliano | Posted 08.12.2014 | Huffpost Code
Robert Siciliano

There are ways to keep the hackers at bay--for the most part, anyways, since no protection is 100 percent efficient.