The drive to build data centers underground arises from fears about natural disasters, terrorism and security intrusions, plus they offer a number of advantages for organizations needing maximum data security.
Shares of Home Depot sank before the opening bell...
Apple is planning to add more security measures...
Every company wants to simplify its business...
Whether famous or seemingly anonymous, people from all walks of life put all sorts of things online or into cloud-based storage systems, from vital financial information to the occasional nude photo. Periodic cases of hacking fuel outrage, but there's no retreat from digital engagement or any imminent promise of guaranteed privacy.
Home Depot may be the latest retailer to suffer a major credit card data breach.
This episode of The IoT Uplink, a new video series examining all the factors driving, influencing and adding to the complexity of the Internet of Things movement, focuses on the growing need for standards and security in the IoT realm.
The FBI said Wednesday it's working with the Secret Service to determine the scope of recently reported cyber attacks against several U.S. financial institutions.
Laurie Segall explains the simple steps you can take if one of your online accounts has been compromised.
More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hackers to steal customer financial data, the Homeland Security Department said Friday.
Sony's PlayStation Network service for video games was unusable from Sunday until Monday afternoon after being flooded by an online attack.
Some customers of The UPS Store may have had their credit and debit card information exposed by a computer virus found on systems at 51 stores in 24 states.
After a series of recent cyber-security breaches it's more important than ever to secure your online accounts. Remembering unique passwords can be difficult, so Marlie Hall looks at how a password manager can help.
There’s no doubt that technology has made manufacturing easier, but it has also opened up manufacturers to IP and data theft that can cost billions. Here are some tips on how companies can protect themselves.
A Oregon Senator called for updates to the rules by which intelligence agencies operate, and said he plans new legislation aimed at ending bulk electronic surveillance.
According to a survey of businesses IT managers worldwide, 21 percent of manufacturers suffered a loss of intellectual property (IP) within the past year.
User-access security is critical to safeguard industrial operations, as well to protect the most valuable assets — including intellectual property.
Under the bill, smartphones must be sold pre-equipped with a "kill switch" that deactivates them if stolen. Such technology is already widely available to download, but the legislation would make the shut-off function standard unless a customer opts out.
Jon Callas, co-founder of Silent Circle, which sells an encryption app allowing users to talk and text in private, said a series of disclosures from former intelligence contractor Edward Snowden last year have been a boon for business.
How a security firm discovered the massive data breach, how to know if your information was compromised, and what to do to prevent further leaks.
Unidentified attackers have burned four Coca-Cola Co. delivery trucks in an area of Mexico's southern state of Guerrero known for drug gang turf battles.
A recent study from Hewlett-Packard reveals that 70 percent of Internet of Things (IoT) devices — including sensors and connected infrastructure — are seriously vulnerable to attack.
For an IT department, working with cloud applications and their providers can present a number of new challenges. Where the IT department previously took a facilitating role, it is now transitioning to a coordinating role. In addition, it can be significantly more difficult to control user and access privileges in cloud applications.
While enabling a mobile workforce can raise concerns about security, data protection and integrity is typically greater with a hosted solution than with an in-house implementation.
The Blackphone offers a higher level of privacy than other smartphones. CEO Toby Weir-Jones explains some of the security-conscious features.
Top American officials said Thursday they challenged their counterparts in China to rein in alleged cybersecurity infringements as a new allegation emerged of a brazen attempt by Chinese hackers to break into U.S. government personnel files.
A Northern California chemical engineer is facing more than 20 years in prison for a rare economic-espionage conviction for selling to China the technology that creates a white pigment.
Cyber forensics experts have developed a way to to steal passwords entered on a smartphone or tablet using Google Glass and other recording devices.
German Chancellor Angela Merkel criticized industrial spying Monday while on a visit to China, which Germany and other governments have cited as a global center for economic espionage.
- Page 1