
Same Security Threats, Different Devices: Wearables and Watchables
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
713 articles
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
Tor is an online browsing portal that keeps your web activity completely anonymous.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
We have bought our very own Blackphone to check its security firsthand.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Yahoo plans to implement end-to-end encryption for all of its mail users, giving normal, non-technical users the power to communicate securely and privately.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.
If you think that threat isn’t real, ask Miss Teen USA 2013, whose webcam was hacked into and used to take nude photos of her.
The list of highly touted devices that have been launched in recent years with embarrassing flaws – security and otherwise – is long and distinguished.
Let’s analyze new safety features in the upcoming Android release while we wait for it to arrive.
Wrapping up our Big Data Week, in this post we talk about potential of abuse of Big Data, which is arguably extreme.