Tests have revealed vulnerabilities in today's tech-enabled vehicles. Hackers have shown that — given time — they would be able to pop the trunk and start the windshield wipers, cut the brakes or lock them up, and even kill the engine.
The new K5 robot features laser scanning and a 360-degree live video camera, but it won't be...
Elliptic Technologies, a leading provider of embedded security solutions for the connected world...
AT&T Mobility, the nation's second-largest cellular provider, says it's no longer attaching hidden Internet tracking codes to data transmitted from its users' smartphones. The practice made it nearly impossible to shield its subscribers' identities online.
BlackBerry is expanding its efforts to sell mobile-security software on its rivals' smartphones and tablets to help counter the waning popularity of its own devices.
According to most data security analysts, Iceland is often referred to as the most privacy-friendly nation for hosting sensitive data. Because data files are becoming larger, it becomes more practical to host data in one central location where it can be readily accessible from any where in the world.
Palo Alto Networks has discovered a new form of malware that may have affected hundreds of thousands of Apple mobile device users.
A cyberattack similar to previous hacker intrusions from China penetrated computer networks for months at USIS, the government's leading security clearance contractor, before the company noticed, officials and others familiar with an FBI investigation and related official inquiries told The Associated Press.
Companies think their network is secure because they bought a product or service, and then they rest. You can’t rest. You need to consistently monitor and analyze your network while investing in training and security updates.
Twenty percent of adults in the U.S. already own a wearable device — and that number is quickly expected to rise, according to a new report by PricewaterhouseCoopers.
Deploying a wireless network requires thoughtful planning and design, as well as periodic monitoring to meet expectations for bandwidth, throughput, reliability and security.
Apple CEO Tim Cook said Apple's new mobile payment system had over 1 million activations in the first three days after it became available, and is now more widely used than any competing payment system.
Apple has posted a new security warning for users of its iCloud online storage service amid reports of a concerted effort to steal passwords and other data from people who use the popular service in China.
The Federal Trade Commission on Tuesday named an outspoken Internet privacy expert, Ashkan Soltani, as its chief technologist in a move that signals the agency's focus on protecting consumers' online privacy.
Staples is looking into a potential credit card data breach and has been in touch with law enforcement officials about the issue.
It seems that many in manufacturing operations and IT are being tasked with quelling security fears instead of being given the opportunity to address these concerns, and leverage the advantages of greater enterprise-wide connectivity.
JPMorgan Chase's CEO Jamie Dimon says that more coordination between businesses and government is needed to combat the rising threat of cyberattacks.
Businesses and governments around the world increasingly are turning to voice biometrics, or voiceprints, to pay pensions, collect taxes, track criminals and replace passwords.
Security software maker Symantec is the latest company to announce plans to split itself into two.
A two-step authentication application called Authy, which is backed by Cameron Winkelvoss, already has 1 million users.
JPMorgan Chase reported hackers have stolen information from about 83 million customers. Anthony Mason reports how these cyber attacks are happening far more often than most people realize.
While the newest Apple and Google smartphones will automatically encrypt data stored on them, that won’t keep U.S. law enforcement and intelligence agencies from obtaining evidence linked to the devices.
JPMorgan said Thursday that the breach compromised customer information pertaining to roughly 76 million households and 7 million small businesses.
Google's Eric Schmidt and Jonathan Rosenberg tell Christine Romans why Google is the safest place on the web, and why they hired Sheryl Sandberg without having a job for her.
Just because you have the right services in place with smart people watching over and securing your data, don’t ever think the job is done. A new threat has arrived, and it is much worse than Heartbleed.
Two members of an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers pleaded guilty to conspiracy charges Tuesday in federal court in Delaware.
Many industrial operations struggle to find the right approach to protect their assets. Instead of designing protections into their systems, some manufacturers wrongly rely on their system’s complexity to keep assets hidden.
- Page 1