Manufacturers in general do a good job of protecting their data, but the task of making sure that access within the organization is restricted on a need-to-know basis can be monumental.
While there’s been a big focus on the Heartbleed Bug and what individuals should do to protect...
The Heartbleed bug is serious. Disclosed less than two days ago, the Heartbleed bug has sent...
A man who was indicted earlier this year for lacing frozen food products with pesticide at a...
The Supreme Court has declined an early look at a constitutional challenge to the National Security Agency's bulk collection of millions of Americans' telephone records. Conservative lawyer Larry Klayman persuaded a federal judge in December to rule that the agency's activities likely violate the Constitution's ban on unreasonable searches.
Samsung announced it will be adding two safeguards to its soon-to-be-released Galaxy S5 smartphone that will lock their device whenever there is an unauthorized attempt to reset it. Up to now, wireless carriers have been resistant to such technology, claiming it could be misused by hackers.
The world's largest mobile-phone maker said users will be able to activate for free its "Find My Mobile" and "Reactivation Lock" anti-theft features to protect the soon-to-be-released Galaxy S5.
A new application called PINgrid is reinventing the password using shapes instead of numbers.
President Barack Obama says a proposal to have U.S. telephone companies hold onto call record data satisfies public concerns about government being in control of the data.
Over this past weekend it was reported that U.S. intelligence agencies hacked into the email servers of Chinese tech giant Huawei. Should companies be outraged or is this just the changing world we live in?
U.S. intelligence agencies hacked into the email servers of Chinese tech giant Huawei five years ago, around the time concerns were growing in Washington that the telecommunications equipment manufacturer was a threat to U.S. national security, two newspapers reported Saturday.
Google has enhanced the encryption technology for its flagship email service in ways that will make it harder for the National Security Agency to intercept messages moving among the company's worldwide data centers.
Microsoft Corp., which has skewered rival Google Inc. for going through customer emails to deliver ads, acknowledged Thursday it had searched emails in a blogger's Hotmail account to track down who was leaking company secrets.
Hackers have installed snooping technology on a UAV and sent it flying around London.
The BYOD trend has positive potential for better communication and collaboration throughout the manufacturing process. However, the use of mobile devices for content and process management has raised questions about information security.
A former civilian defense contractor in Hawaii on Thursday pleaded guilty to charges he divulged military secrets to his Chinese girlfriend and kept classified documents at his suburban Honolulu home.
The top U.S. military officer says it will take two years of study and billions of dollars to overcome the loss of security to military operations and tactics revealed by Edward Snowden.
CIOs from companies in all walks of business are using the Target breach as a rallying point to call attention to their struggle and garner additional funds and manpower to fight digital threats.
State and federal politicians are pushing for a kill switch that would allow users to disable stolen smartphones to make them worthless on the black market.
The aerospace company is now developing an Android-based smartphone, codenamed “Black,” that will self-destruct if a third party attempts to break in and extract its secrets.
New cutting-edge technology could help you reclaim the security of your smartphone. Chip Reid reports on the Blackphone, which runs on a customized operating system that is entirely encrypted.
The sensor brings convenience for entering passcodes and could encourage more people to lock their phones. But fingerprint security isn't foolproof. Here's what to know as you consider whether to place your trust in it.
U.S. retailers are using mobile-based technology to track shoppers' movements at some malls and stores. The companies collecting the information say it's anonymous, can't be traced to a specific person and no one should worry about invasion of privacy.
A coalition of the leading U.S. technology firms is urging changes in the government's spying programs.
Although social engineering often ultimately leads to a cyber attacks, it may not start out that way. It may start with someone pretending to be a customer or the CEO’s friend, telephoning your company and tricking someone to give out information they should not be divulging.
Google is offering new and "far-reaching" concessions to the European Union's antitrust watchdog that are likely to be enough to settle allegations it is abusing its dominant position in Internet searches, the EU said Wednesday.
One of the six men from China charged with conspiring to steal patented seed corn from two of the nation's leading seed developers has appeared in federal court in Des Moines and was ordered held in custody while he awaits trial.
An 83-year-old Catholic nun convicted in a protest and break-in at the primary U.S. storehouse for bomb-grade uranium will find out Tuesday whether she spends what could be the rest of her life in prison.
Former NSA contractor Edward Snowden claimed in a new interview that the U.S. agency is involved in industrial espionage.
- Page 1