- Seven technology predictions for 2014
- French Treasury accidentally signs SSL certificate for Google.com domains
- Hacker-built drone can hunt, hijack other drones
- Blue Cross: 840,000 healthcare records at risk after laptop theft
- The week in security: Microsoft fights NSA as shadow IT bites business
If you get a spam message advertising an application called "Bitcoin Alarm," the name may tell you all you need to know.
Google will now display images by default in Gmail because it says it has developed a system that protects message recipients from potentially dangerous photos and graphics.
A widely used security feature intended to protect access to online bank accounts is becoming increasingly ineffective, as cybercriminals develop advanced malicious software for Android devices, according to a report released Wednesday.
As Bitcoin's popularity grows, so does talk about its standing as legal tender, but there are lingering issues that need to be sorted out before people start using Bitcoin to buy everyday things, experts said on Monday.
Apple is taking a closer look at shoppers in its retail stores, under a new program that will push product-related information to their mobile devices using its iBeacon trackers.
Your email address is like your home address: Never give it out unless absolutely necessary.
We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
Experts on Web application security gathered recently at a seminar organized by Dimension Data and Check Point to discuss serious business implications of Distributed Denial of Service (DDoS) attacks if not properly addressed by enterprises.
Confession time: I'm an inveterate social media junkie. From Facebook to Instagram to Diaspora, whenever a new communication platform rolls around--or comes back around--I'm ready to leap aboard.
Facebook users are constantly being told that their privacy is under siege. Here are seven apps that can help secure your personal data.
Before you "like" a friend's or company's post on Facebook, think twice. A new study shows that your Facebook "likes" may be far more revealing than you ever thought.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.