Manufacturing companies have a notorious need to store large files and provide access from multiple offices, all on a restricted budget. In a world where manufacturing production is king, capital expenses are laser-focused on tools and equipment, leaving IT to strategically minimize capital investment while delivering enterprise-class IT operations.
Signs are growing that the sustained surge in cyberattacks emanating from China is imperiling its relations with the U.S., lending urgency to fledgling efforts by both governments to engage on the issue. The Pentagon this week said China appeared to be cyberspying against the U.S. government, the first time it has made such an assertion in its annual report on Chinese military power.
If you don’t have a Computer Incident Response Plan (CIRP), resolving an incident will be much more difficult on your company and much more expensive. Because the longer you wait to eradicate a threat, the more time the intruders have to steal valuable information on you and your customers, and to make fraudulent wire transfers from your banking accounts.
In San Francisco, where half the robberies were phone-related last year, District Attorney George Gascon is calling on major companies in nearby Silicon Valley to create new technology such as a "kill switch" to permanently and quickly disable stolen smart phones, making them worthless to thieves.
The South Korean company said Friday the Galaxy S4 smartphone has become the first Android device to meet the security requirements set out by the U.S. government, allowing government and military officials to access the Defense Department's networks with the S4.
A Wi-Fi-enabled computer can connect to multiple networks at the same time. Your employees can give a hacker a pathway into your internal network simply by powering up a laptop. Imagine the mess an eco-terrorist could make if he didn’t like the look of your smokestack.
The U.S. service academies are ramping up efforts to groom a new breed of cyberspace warriors to confront increasing threats to the nation's military and civilian computer networks that control everything from electrical power grids to the banking system.
The Shodan search engine allows anyone to search for anything connected to the Internet and if security settings are not turned on, take control of the device. Hackers, both good and bad, use the site to locate the increasing number of Internet capable devices like traffic lights, a computer or even a business.
One of the leading U.S. civil-rights organizations is taking on an unusual cause: spotty smartphone updates. The ACLU says that sluggish fixes have been saddling many smartphone users with software that is out of date and therefore dangerous.
The White House on Tuesday threatened a veto against a House bill intended to improve cybersecurity through information-sharing, warning lawmakers that the president won't sign the measure unless changes are made to protect privacy and civil liberties.
Businesses that allow their employees to use mobile devices need to be aware of their vulnerabilities and how they could infect the company network. If a company issues and follows good security policies for its desktops and laptops, both of those are likely to be more secure than any tablet or mobile phone because there are limited actions that can be taken to secure them.
Internet security experts show how malicious code can sneak onto an Android smartphone through a non-threatening app installation, and give total control to a hacker. All hackers have to do is get smartphone users to download their apps. NBC's Chris Clackum reports.
Unlike checking your NCAA bracket pool during business hours – business owners don’t have a problem with work going outside of the office, as nine out of ten manufacturers and distributors see positive results from employees’ use of mobile devices for work.
The U.S. has taken its first real swipe at China following accusations that the Beijing government is behind a widespread and systemic hacking campaign targeting U.S. businesses. Buried in a spending bill signed by President Barack Obama on Tuesday is a provision that effectively bars much of the U.S. government from buying information technology made by companies linked to the Chinese government.
One company that blocks spam has blacklisted another company that hosts websites because it's believed that they host too much spam -- as a result, the website hosting company has clogged the Internet by overloading the spam blocker with requests for service. NBC's Katy Tur reports.
Security researchers at Symantec warn that the next target for hackers will be your mobile device. NBC News' Bob Sullivan gets a demonstration of just how easy it is to hack a phone. Breaking into a cellphone may not be difficult, but very lucrative for a hacker.
An admitted online "troll" was sentenced Monday to the maximum prison term under federal guidelines — more than three years — for illegally gaining access to AT&T's servers and stealing more than 100,000 email addresses of iPad users.
A man convicted of illegally gaining access to AT&T's servers and stealing more than 100,000 email addresses of iPad users is facing sentencing. Andrew Auernheimer is scheduled to appear in federal court in Newark on Monday. The former Arkansas resident was convicted in November of identity theft and conspiracy to gain unauthorized access to computers.
CBS News legal analyst Jack Ford speaks to the CBS This Morning co-hosts about Google's settlement in the Wi-Fi spying case, and what it means for the search-engine giant. A program gave Google the power to intercept emails, passwords and other information through unsecured Wi-Fi networks.
For the first time the U.S. intelligence community says cyber attacks and cyber espionage — not terrorism — are the top threats to national security. Now the Pentagon is forming 13 teams to guard the nation in cyberspace. NBC’s Andrea Mitchell reports.
Hackers released sensitive personal online information of 14 high-profile figures on Monday, including First Lady Michelle Obama, Vice President Joe Biden, Paris Hilton and Kim Kardashian. NBC's Pete Williams reports on the privacy breach.
Google will pay a $7 million penalty to settle a multistate investigation into the Internet search leader's collection of emails, passwords and other sensitive information sent over wireless networks several years ago in neighborhoods scattered around the world.
Online note-taking service Evernote Corp. has been hacked and is resetting all its 50 million users' passwords as a precaution. The Redwood City, California-based company said in a post published late Saturday that an attacker had been able to access sensitive customer information and that every user would have their account reset "in an abundance of caution."
Mobile devices are changing how business is done. Tablets, in particular, are rapidly becoming the business productivity tool of choice for many workers who want constant connectivity and ultimate portability. However, most tablets and notebooks are only Wi-Fi enabled, and most mobile workers don’t think twice about the security risks when logging onto a public network that is easy to access.