iOS app Android app

Hacking

The if's, and's & Yo's of it

Marc Shifflett | Posted 07.31.2014 | Huffpost Code
Marc Shifflett

Yes, there was a Yo Hackathon.

Make Information Security a Priority

Robert Siciliano | Posted 07.30.2014 | Technology
Robert Siciliano

We all know that 123qwe is such an easy password to remember, especially if it's for all gazillion of your accounts. You know whom else finds this very convenient? Hackers!

Facebook Security for Parents and Teens

Robert Siciliano | Posted 07.28.2014 | Parents
Robert Siciliano

Facebook offers a hefty amount of security measures that parents and teens should know about. Here are a few highlights.

Malware Can Hide in the Most Obvious Places

Robert Siciliano | Posted 07.28.2014 | Technology
Robert Siciliano

You never know when malware will bite. Even browsing an online restaurant menu can download malicious code, put there by hackers.

Beware of Flight MH17 Facebook Scams

Robert Siciliano | Posted 07.23.2014 | Crime
Robert Siciliano

How low can scammers go? The latest is phony Facebook profiles that use identities of deceased victims of Malaysia Airlines Flight MH17 -- claiming th...

Six Mistakes to Avoid When Writing Code for the Internet of Things

Samuel Bucholtz | Posted 07.23.2014 | Home
Samuel Bucholtz

Companies like Intel, Google, Samsung, Microsoft, General Electric, Cisco, AT&T and IBM, which are already taking an active role in Internet of Things development, will soon be placing a greater emphasis on risk-mitigation with these products - and developers who can deliver on security, in addition to performance and UX, are likely to be a step ahead of the competition.

Phishing Alert: 8 Tips to Protect Yourself from Attacks

Robert Siciliano | Posted 07.22.2014 | Technology
Robert Siciliano

So many people fail to learn about phishing scams, a favorite and extremely prevalent scam among cybercriminals. A type of phishing scam is to lure the user onto a malicious website.

How to Prevent Summertime Scams

Robert Siciliano | Posted 07.21.2014 | Crime
Robert Siciliano

Summertime is here -- and that means sunshine and vacations. Most people love summertime, including scammers! Hackers can use this time to take advantage while we are planning vacations or on vacation or just enjoying fun in the sun. Here are some key scams to watch out for this summer.

Everything You Need to Know About a Credit Freeze

Robert Siciliano | Posted 07.17.2014 | Money
Robert Siciliano

A credit freeze locks down your credit report so lenders can't see your scores, making your credit/SSN useless to them because they don't know their risk level.

#AOLBUILD Features Documentary Filmmaker, Brian Knappenberger

AOL BUILD | Posted 07.28.2014 | Technology
AOL BUILD

Self-proclaimed "front page of the Internet," Reddit is the tech world's "new black." From social media and entertainment to news and video content,...

Report: Chinese Hackers Broke Into U.S. Personnel Networks

AP | Posted 07.10.2014 | Politics

WASHINGTON (AP) — Chinese hackers broke into the computer networks of the U.S. Office of Personnel Management earlier this year with the intention o...

Recognize Your Willingness To Give Up Your Privacy

Robert Siciliano | Posted 07.09.2014 | Technology
Robert Siciliano

If a stranger stopped you on the street and requested your e-mail address and birthdate, would you give it to that person? A rational person would nev...

Russia Accuses U.S. Of 'Kidnapping' Alleged Hacker

Reuters | Posted 07.08.2014 | World

(Adds U.S. comments, paragraph 7) WASHINGTON/MOSCOW, July 8 (Reuters) - Russia accused the United States on Tuesday of violating a bil...

Most NSA-Proof Security Solutions Are Deliberate Deceptions

Rebecca Abrahams | Posted 07.07.2014 | Technology
Rebecca Abrahams

Co-authored by Dr. Stephen Bryen, Chairman & CTO Ziklag Systems Many products, ranging from texting, to email, to secure voice calling claim to be "N...

What Is an Advanced Persistent Threat?

Robert Siciliano | Posted 07.07.2014 | Technology
Robert Siciliano

If you’ve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their “enemy,” you have some familiarity with an ad...

Graduates, Beware of Identity Theft

Robert Siciliano | Posted 07.04.2014 | Technology
Robert Siciliano

Worried about finding a job after you graduate from college? Worried about paying off your debts? It gets uglier: New college grads need to think about their identities being stolen. One-third of identity theft complaints come from young adults.

How to Prepare a Storage Device for Resale

Robert Siciliano | Posted 07.02.2014 | Technology
Robert Siciliano

If you want ultimate reassurance of destroying data, destroy the device with a hammer or drill through the drive with multiple holes.

'Green News Report' - July 1, 2014

Brad Friedman and Desi Doyen | Posted 07.01.2014 | Green
Brad Friedman and Desi Doyen

The Green News Report is also available via... IN TODAY'S RADIO REPORT: Big Coal baron says Obama's 'evil', attacks wildly popular new EPA emis...

Bankers on the Front Lines of Cyber Defense

Robert Siciliano | Posted 06.30.2014 | Business
Robert Siciliano

Nowadays, terms like firewalls, encryption, anti-virus and cloud providers are just as important to a bank's security as are the armed guards, huge windows, security cameras and steel vaults.

Health Care Firm Pays Big Bucks for Breach

Robert Siciliano | Posted 06.26.2014 | Business
Robert Siciliano

A data breach can slug below the belt and knock a healthcare business flat on its back, as was the case with Columbia University and the New York and ...

WiFi World Wide a Big Security Issue

Robert Siciliano | Posted 06.25.2014 | Technology
Robert Siciliano

What usually happens is that the criminals establish Wi-Fi hotspots that trick people into thinking they are legitimate public Wi-Fi locations -- people take the bait and log on.

6 Ways to Remove Junk Mail Forever

Robert Siciliano | Posted 06.24.2014 | Technology
Robert Siciliano

Though you won't be able to completely eliminate junk mail, the following approaches will considerably de-clutter your mail box.

Encryption: The Problem is the Man in the Middle

Rebecca Abrahams | Posted 06.23.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, Chairman & CTO, Ziklag Systems Encryption is becoming a big deal these days and some of the top companies are imp...

Data Breaches Equal Job Loss

Robert Siciliano | Posted 06.20.2014 | Business
Robert Siciliano

Is it coincidence that Beth Jacob CIO resigned from her job as chief information officer of Target Corporation? Or could this possibly be connected to...

Banks Helping Customers Identify Potentially Unwanted Charges

Robert Siciliano | Posted 06.18.2014 | Technology
Robert Siciliano

Capital One is leading the way for banks helping customers smoke out potentially invalid charges. Capital One's service is free, called Second Look. S...