iOS app Android app


How to Secure Your WordPress Website

Melinda Emerson | Posted 12.31.2013 | Small Business
Melinda Emerson

WordPress is a popular website and blog platform among small businesses. However, if you aren't diligent about security, you might just get hacked -- which is what happened to me. Throughout the process I thought it would be helpful to share how to secure your WordPress website.

5 Rules For Using Coffee Shop WiFi

Robert Siciliano | Posted 01.23.2014 | Technology
Robert Siciliano

In order to compete with the likes of the chain coffee shops and now fast food joints, just about every coffee shop or small restaurant is supplying i...

What's Behind the Spying?

Rebecca Abrahams | Posted 12.21.2013 | Technology
Rebecca Abrahams

The United States has been carrying out political and economic spying. Terrorism probably accounts for only a small portion of what the mighty NSA collection apparatus sweeps up. Why is this?

Unsecured Wireless Video Baby Monitors Hackable

Robert Siciliano | Posted 12.17.2013 | Technology
Robert Siciliano

Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras ...

New Hacker Threat -- Targeting You Through Your Kids

David Kennedy | Posted 01.23.2014 | Technology
David Kennedy

It's important for parents to realize that just because you have parental controls on your computer, that doesn't mean your child is safe from online criminals. There are dozens of ways your kids could be targeted online, but here are the ones most likely to happen in your home.

How to Keep Your Business Secure from the Outside In

Robert Siciliano | Posted 12.16.2013 | Crime
Robert Siciliano

When it comes to keeping your business safe, there's more to being mindful than simply bolting the front door when you leave for the day. When we cons...

What's the Point of $1 Million in Insurance for Identity Theft?

Robert Siciliano | Posted 01.23.2014 | Technology
Robert Siciliano

Honesty is the best policy, right? I've spent my life being honest, and do you know what is the most important lesson I've learned is? The truth hurts...

How I Hacked Angelina Jolie's Premiere Party

Rolla Selbak | Posted 01.23.2014 | Celebrity
Rolla Selbak

To achieve anything great, one has to be obsessed, persistent, fearless, and believe in a little bit of magic, and you too can beat your kingdom.

Gerry Smith

Feds Charge 13 Members Of Anonymous | Gerry Smith | Posted 10.04.2013 | Technology

Federal prosecutors brought charges against 13 people Thursday for allegedly helping the hacker group Anonymous carry out attacks against a number of ...

Cyber Security Awareness - Why Higher Education Institutions Need To Address Digital Threats

Jonathan Rajewski | Posted 01.23.2014 | Technology
Jonathan Rajewski

In order to provide adequate personnel and resources to combat and stop these threats, higher education institutions need to see the bigger picture of intense cyber security threats that can do more damage than a hacker stealing someone's email login.

Is It Ever OK to Break Into Your Colleague's Computer?

Karen Firestone | Posted 11.23.2013 | Business
Karen Firestone

The digital age offers us immense opportunities to hone our detective skills, to observe our colleagues in an entirely new, not necessarily flattering light, and also presents tremendous challenges in terms of how we use that information.

Gitmo Logistics & DoD Computer Mess Likely to Delay 9/11 Case

Daphne Eviatar | Posted 11.20.2013 | World
Daphne Eviatar

Witnesses provided more details of the Defense Department's computer mess-ups and confidentiality breaches in the 9/11 hearings on Friday, and defense lawyers renewed their request to delay the hearings until those problems could be resolved.

British Police Bust Suspected Cyber Theft Ring

AP | GREGORY KATZ | Posted 11.20.2013 | Business

LONDON — Eight men have been arrested on suspicion of stealing 1.3 million pounds ($2 million) from a Barclays bank branch by tapping into its c...

How the Average Consumer Can Keep Their Smartphone Secure and Private, a Conversation with an Identity Theft Expert

Robert Siciliano | Posted 11.19.2013 | Technology
Robert Siciliano

Journalist David Geer interviewed me. "A mobile phone is lost every 3.5 seconds. More than half of those devices are smartphones. 40% are not passw...

Is Anything Safe Online?

Michael Gregg | Posted 11.16.2013 | Technology
Michael Gregg

The reality is, there's never been any such thing as online privacy. Just because the website you're on has a lock symbol in the address bar, doesn't mean it's 100 percent safe. Here are four ways you didn't know you could get hacked.

Now Your Finger Will be Hacked

Rebecca Abrahams | Posted 11.16.2013 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, CEO Ziklag Systems Apple is installing a finger print reader on its new 5S phone. The idea behind it is that a fin...

How to Keep Employees' Personal Details Secure

Robert Siciliano | Posted 11.12.2013 | Technology
Robert Siciliano

Beware! There are criminals in our midst. We can't see them, but they're around, waiting for our laptops, PCs or work computers to succumb to a virus ...

Caller ID Spoofing Effective in Identity Theft

Robert Siciliano | Posted 11.05.2013 | Crime
Robert Siciliano

Caller ID spoofing is when a telephone's caller ID displays a number that does not belong to the person calling. The telephone network is tricked int...

This Teen Is Better Than Almost Anyone At Figuring Out Apple's Secrets

Reuters | Michael Sin | Posted 11.05.2013 | Technology

By Michael Sin SYDNEY (Reuters) - An Australian teenager who has built an online following by leaking pictures of upcoming Apple Inc pr...

Iran's Teaching Hacking in High School

Micah D. Halpern | Posted 10.30.2013 | World
Micah D. Halpern

This could be a brilliant plan by the Iranians. But, it won't be. It will, most certainly, backfire. All plans like this backfire. They fail because they do not understand the way young adults think and they do not understand the nature and character of the hacker.

10 Ways to Protect Your Twitter Account From Getting Hacked

Robert Siciliano | Posted 10.23.2013 | Technology
Robert Siciliano

Recent news of Twitter accounts being hacked has slowed a bit, partly due to Twitter implementing two-factor authentication. When you sign in to Twitt...

Hacker Claims Access To 'Entire Database Of Users On Twitter'

The Huffington Post | Drew Guarini | Posted 08.20.2013 | Technology

An Islamist hacker claiming he has access to "the entire database of users on Twitter" leaked the account information of 15,000 people on Tuesday. ...

The Urban Myth About Car Thieves That's True

Hemanshu Nigam | Posted 10.18.2013 | Crime
Hemanshu Nigam

According to authorities around the world, however, this disturbing trend in digital crime represents a sobering reality for owners of vehicles with keyless entry systems.

The Worst Hacking Scenes Of All Time

Posted 08.16.2013 | Comedy

This composite of classic hacking scenes makes us wonder if film writers even know what computers are. To be a movie hacker you just have to frantical...

DEF CON: Hacking for the Rest of Us

Adam J. Rose | Posted 10.06.2013 | Technology
Adam J. Rose

I don't know enough about hacking and odds are you don't, either. I set out to learn more at DEF CON, a hacking conference with enough discussions on civil liberties, ethics and philosophy to delight a liberal arts major. Charged to "live an examined life," we should all think harder about our technology, privacy and security.