iOS app Android app


USB Drives Have Serious Security Flaws

Robert Siciliano | Posted 09.30.2014 | Technology
Robert Siciliano

That little thing that you stick in your computer to store or transfer data can also mean very bad news.

Sexism in Tech, and What One NYU Student Is Doing About It

Guy Cimbalo | Posted 09.30.2014 | Technology
Guy Cimbalo

The Tumblr blog Hackers of NY launched in February this year and very quickly became a phenomenon, spawning spin off sites everywhere from Miami to Bangalore -- there's now a "Hackers of..." in nine countries and 13 cities.

How Hacking Education Has Taken Over Higher Education

Nisarg Patel | Posted 09.29.2014 | College
Nisarg Patel

The rapid growth of collegiate hackathons over just the last few years and the popularity of personal websites has converted the student resume from cardstock to LED. Any student now has the capability to complete and share their ideas with people all over the world.

Five Ways Cyberterrorists Could Target The U.S.

Michael Gregg | Posted 09.25.2014 | Crime
Michael Gregg

Cyberwarfare is now largely seen as an integral part of modern warfare by most developed nations. Until now, however, we have yet to see sophisticated cyber tactics be used by jihadist groups like al-Qaeda or ISIS. But that could soon change.

New Software Bug May Be Worse Than 'Heartbleed'

Reuters | Posted 09.25.2014 | Technology

By Jim Finkle BOSTON (Reuters) - A newly discovered security bug in a widely used piece of Linux software, known as "Bash," could pose a...

You Can Create The Perfect Password. Here's How

The Huffington Post | Kerry Flynn | Posted 09.25.2014 | Technology

Are you one of those people who's still using "baseball" or your home address for all your passwords? We shouldn't have to tell you this, but having s...

Please Protect Me From My Password

Tarun Sakhrani | Posted 09.21.2014 | Technology
Tarun Sakhrani

In today's day and age, with technology at our fingertips (quite literally) there has been a bit of an invasion of our personal space and our privacy. Some of it is by our choosing, some of it not so much.

Cyber Attack: Coming to a Store Near You

Rebecca Abrahams | Posted 09.17.2014 | Business
Rebecca Abrahams

BigPill Drug stores began in 1960 and grew to 35 stores by 1990. The company had more than 100 stores in 2000. It is now a publicly traded company, w...

5 Million Gmail Usernames And Associated Passwords Leaked

The Huffington Post | Alexis Kleinman | Posted 09.12.2014 | Technology

It's time to change your Gmail password -- again. Around 5 million Gmail usernames and associated passwords were leaked on a Russian Internet foru...

How to Secure Your iCloud

Robert Siciliano | Posted 09.08.2014 | Technology
Robert Siciliano

By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app.

Botnets Here, Botnets There, Botnets EVERYWHERE

Robert Siciliano | Posted 09.08.2014 | Huffpost Code
Robert Siciliano

What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybercrime ring.

Researchers say your Mobile Carrier's Network isn't all that Secure

Robert Siciliano | Posted 09.08.2014 | Technology
Robert Siciliano

Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into.

Gerry Smith

If You're Not Famous, Good Luck Getting Reddit To Take Down Your Nude Photos | Gerry Smith | Posted 09.09.2014 | Technology

The social news site Reddit took down a forum over the weekend that spread stolen naked photos of celebrities like Jennifer Lawrence and Kate Upton, s...

4 Identity Protection Habits Every College Student Should Have

Robert Siciliano | Posted 09.08.2014 | Money
Robert Siciliano

It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age.

Technology Companies Need To Take Responsibility And Give Us A Better Default

Tarun Wadhwa | Posted 09.07.2014 | Technology
Tarun Wadhwa

It's no longer a surprise to hear that a major company has had their customers' personal information compromised. Every day identity theft becomes mor...

Give Me $46 Billion and I will Build a Safe Computer System

Rebecca Abrahams | Posted 09.05.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, Founder & Chairman Ziklag Systems ABI Research estimates that cyber security spending on the critical infrastructur...

Are Those Security Questions Begging You to Lie?

Adam Levin | Posted 09.05.2014 | Technology
Adam Levin

As the smoke clears from this latest attack on privacy and our collective sense of decency, it's becoming more and more likely that a deft use of personally identifiable information was used to unlock the nude celebrity photo troves that flooded the Internet.

The Bigger Issue: Will Americans Ever Get Past Their Peeping Tom Mentality?

Lorraine Devon Wilke | Posted 09.03.2014 | Entertainment
Lorraine Devon Wilke

Jokes are made about the salivating, ugly Americans ogling topless sunbathers at European beaches, but the schizophrenic nature of our country's relationship with sex has passed from laughable to lamentable to downright detrimental.

What the Hacker Scandal Means for Society

Katrina Sands | Posted 09.03.2014 | Entertainment
Katrina Sands

Why do we normalize forced and involuntary pornography of women? Why do we consistently participate in the exploitation of women, and why do we turn the ownership of the female body into a spectator sport?

Majority of Executives Believe Attackers Will Overcome Corporate Defenses

Robert Siciliano | Posted 09.02.2014 | Business
Robert Siciliano

Many technology executives don't have a favorable outlook on their ability to sideswipe cybercriminals, according to research conducted by McKinsey and World Economic Forum.

What I Want My Kids to Learn From the Jennifer Lawrence Hacking Scandal

Angela Keck | Posted 09.02.2014 | Parents
Angela Keck

From the moment that my children had access to things like camera phones or laptops with webcams, I have had numerous conversations about how any photo you take can be shared, and anything that is shared can be seen by the entire world.

How To Keep Your iPhone Photos Safe, In 3 Steps

The Huffington Post | Alexis Kleinman | Posted 09.02.2014 | Technology

After a huge number of nude celebrity photos were leaked over the weekend, you should take a moment to ensure the photos that you have on your phone a...

Family Identity Theft Is Ugly

Robert Siciliano | Posted 08.29.2014 | Technology
Robert Siciliano

It's easy, for instance, for a parent to access their child's name and Social Security number, then open up a phony account--even if the victim is literally a child. Most companies don't check the ages, so that's why this crime can go undetected for years.

Best Way to Destroy a Computer Virus

Robert Siciliano | Posted 08.28.2014 | Technology
Robert Siciliano

You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats.

Russian Hackers Said to Loot Gigabytes of Big Bank Data

Bloomberg | Posted 08.28.2014 | Business

Russian hackers attacked JPMorgan Chase & Co. and at least four other banks this month in a coordinated assault that resulted in the loss of gigabytes...