Executives, developers and pretty much everyone else can take away important lessons from Uber’s recent hack
Your Android phone contains a lot of sensitive data. Here’s how not to lose it.
Over the years, the internet has become the dominion of a few powerful companies, to the detriment of all.
Face recognition is more convenient than other forms of authentication—but not necessarily more secure
When hackers compromise your software distribution pipeline, more than security, you lose the trust and confidence of your customers.
The Equifax data breach should serve as a wake up call for all users to take ownership and responsibility of protecting their data
These management tips will protect your employees and customers against security incidents
Crucial measures to make sure your online accounts are protected
Unfortunately, it is fair to say that the vulnerabilities of Internet of Things (IoT) are preceding its innovations and utilities. From the hacking of the Ukraine power grid, to last […]
By Heather Redding Today tech enthusiasts around the world appreciate the growing importance of 3D printing. This breakthrough technology has rapidly expanded beyond simple prototype creation and hobby design efforts to […]
The Petya/NotPetya/ExPetr/PetyaWrap outbreak was a convoluted cyberattack disguised as a ransomware hiding much more sinister intentions.
By Karen Mesoznik, SaferVPN What You Should Know About Public Wi-Fi Usually when you’re preparing for an upcoming trip, your mind runs through the usual concerns and questions: “What vaccinations […]
How will the future of IoT affect cybersecurity? F-Secure’s Mikko Hypponen explains at the TNW Conference.
IoT Defense’s T Roy explains how your home router exposes you to threats, and how you can prevent them.
Businesses rarely encrypt their email messages because good encryption is too hard to use. That’s changing. By Randy Battat, PreVeil Most business-to-business communication involves sensitive information – stuff that the […]
As internet privacy continues to unravel, it is becoming more and more evident that you’re on your own to protect your data against the many parties that are looking to […]