Millions of people may have been left vulnerable to hackers while surfing the web on Apple and Google devices, thanks to a newly discovered security flaw known as "FREAK attack."
Gary Kovacs discusses the importance of securing your smartphone.
The Federal Communications Commission voted Thursday to protect so-called "net neutrality" by...
Goldman Sachs CEO Lloyd Blankfein says securing the bank's technology is "anxiety producing" and...
In 2014, organizations were caught off guard by the increase in advanced threats targeting vulnerabilities within business-critical applications. In order to ensure that this information is secured, manufacturing organizations must implement measures that eliminate any and all threats to the business before they evolve.
A little-known Silicon Valley startup was caught in a firestorm of criticism this week for making software that exposed Lenovo laptop users to hackers bent on stealing personal information. But Superfish Inc. has also won praise for producing visual search technology that many see as the next big thing in online shopping.
Experts say the world's biggest computer maker shipped laptops with pre-installed software that could let hackers steal passwords or other sensitive information when you use the web to shop, pay bills or check email.
It's not a bird or a plane, but a blimp in the sky, floating over Maryland's Baltimore suburbs. It's the newest security system launched by the Army to protect major cities along the East Coast, and it can detect everything from a cruise missile to a large drone.
A national manufacturing group is calling for congressional passage of an overseas email privacy bill, arguing it would help protect American business relationships abroad.
Responding to unprecedented data breaches and cyberattacks, President Barack Obama is trying to spark alliances between policymakers who want to regulate the online world and tech innovators who traditionally shun Beltway bureaucracies.
A growing number of companies, including Twitter Inc., are giving their workers' a pop quiz, testing security savvy by sending spoof phishing emails to see who bites.
Sansa Security, a provider of embedded security technologies, today announced that it has joined the Industrial Internet Consortium (IIC) in the hopes of accelerating the growth of the industrial Internet and Internet of Things (IoT) technologies.
Today, the White House will announce the creation of a new agency named the Cyber Threat Intelligence Integration Center (CTIIC) — which will be tasked with thwarting cyberattacks by sharing intelligence across other agencies in the event of a crisis.
Ever since the Internet blossomed in the 1990s, cybersecurity was built on the idea that computers could be protected by a digital quarantine. Now, as hackers routinely overwhelm such defenses, experts say cybersecurity is beyond due an overhaul.
TV technology, like Samsung's SmartTV, enables televisions to act on voice commands, but the TV sets can capture other words you say and transmit them to third parties. That's raising concerns about privacy.
Democratic senators on Friday called on federal regulators to investigate Verizon Wireless, the country's biggest mobile provider, for secretly inserting unique tracking codes into the Web traffic of its some 100 million customers.
Automakers are cramming cars with wireless technology, but they have failed to adequately protect those features against the real possibility that hackers could take control of vehicles or steal personal data, according to an analysis of information that manufacturers provided to a senator.
SurveyMonkey CEO Dave Goldberg discusses the lack of concern about cybersecurity in the U.S.
James Fox, head of cyber defense services at KPMG, and Craig Richardson, CEO at Wynyard Group, discuss the ways companies can prepare for and protect themselves from cyberattacks.
Responding to reports that China is blocking VPN services that let users jump the Great Firewall, an Internet official said Tuesday that "harmful information" must be managed.
A staggering 43 percent of U.S. companies have experienced a data breach in the last year according to the Ponemon Institute. Despite the rise in breaches, 27 percent of companies didn't have a data breach response plan or team in place.
China is blocking VPN services that let users skirt online censorship of popular websites such as Google and Facebook amid a wider crackdown on online information, tech companies and specialists said Friday.
Another computer security threat is spreading and you may have already seen it in action.
Today’s social media age has led consumers to embrace companies that are straightforward and explicit in all external communications. However, logistics companies that handle sensitive commodities must be savvy with their communication strategy in order to preserve customers’ privacy and security.
As news of stolen data and cyberattacks becomes an increasing part of our daily lives, President Obama is urging Congress to pass legislation to better protect personal data and put the U.S. on a path to a better cyberdefense.
Increased investment in employee training can reduce the risk of a company's cyber security attack by up to 70 percent, according to a new study.
President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked.
You may wish you had a crystal ball to see what cyber threats are headed your way, but there’s something far more reliable. Threat intelligence provides you with true evidence of current-day threats that have already been spotted hitting organizations like yours.
Sony Corp.'s top corporate executive on Monday condemned the recent hacking assault against its film division, saying his employees were victims of a "vicious and malicious cyberattack."
- Page 1