A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyberwarfare as an option in conflicts with enemies.
Breaches and attacks have gotten worse and will continue to get worse until the computer...
Organizations continue to exhibit "sizable gaps" in their cybersecurity protocol, according to...
In this day and age, due to such aggressive attacks by hackers, every company should assume that they have been or will be hacked. Activate founder Michael Wolf discusses cybersecurity in the wake of the Heartbleed bug and recent company hack attacks.
A new group of international cybercrime fighters claimed one of its first kills Thursday, pulling the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States.
AT&T is paying $25 million in a settlement with federal regulators over data breaches at call centers.
President Barack Obama on Wednesday authorized a new U.S. government approach to deterring cyberattacks: financial sanctions against malicious overseas hackers and companies that knowingly benefit from the fruits of cyberespionage.
A new report from Deloitte and the Manufacturers Alliance for Productivity and Innovation recommends that manufacturers convert their risk management practices to "an ongoing conversation rather than a periodic presentation."
Tech expert and Chief Technology Officer at SRV Network, Inc., Karl Volkman, returns to give his tips for catching a hacker.
Forget about forgetting passwords — Yahoo has introduced a system for sending single-use passwords on demand to mobile phone users, while Microsoft is proposing "biometric authentication,” in which your computer must recognize your face, iris or fingerprint to grant you access
Tapping the full potential of smart, connected devices hinges on having physical security and access-control technologies and processes capable of protecting the new streams of industrial data.
The Justice Department is at odds with Google and privacy groups over the government's push to make it easier to locate and hack into computers in criminal investigations, a simmering conflict with constitutional and policy implications.
Pkware CEO Miller Newton discusses Apple Watch security features.
Millions of people may have been left vulnerable to hackers while surfing the web on Apple and Google devices, thanks to a newly discovered security flaw known as "FREAK attack."
Gary Kovacs discusses the importance of securing your smartphone.
The Federal Communications Commission voted Thursday to protect so-called "net neutrality" by establishing uniform standards for those using the Internet.
Goldman Sachs CEO Lloyd Blankfein says securing the bank's technology is "anxiety producing" and that "it would be foolish to make claims of perfection" because "the reliance on technology is one of the biggest risks we all have."
In 2014, organizations were caught off guard by the increase in advanced threats targeting vulnerabilities within business-critical applications. In order to ensure that this information is secured, manufacturing organizations must implement measures that eliminate any and all threats to the business before they evolve.
A little-known Silicon Valley startup was caught in a firestorm of criticism this week for making software that exposed Lenovo laptop users to hackers bent on stealing personal information. But Superfish Inc. has also won praise for producing visual search technology that many see as the next big thing in online shopping.
Experts say the world's biggest computer maker shipped laptops with pre-installed software that could let hackers steal passwords or other sensitive information when you use the web to shop, pay bills or check email.
It's not a bird or a plane, but a blimp in the sky, floating over Maryland's Baltimore suburbs. It's the newest security system launched by the Army to protect major cities along the East Coast, and it can detect everything from a cruise missile to a large drone.
A national manufacturing group is calling for congressional passage of an overseas email privacy bill, arguing it would help protect American business relationships abroad.
Responding to unprecedented data breaches and cyberattacks, President Barack Obama is trying to spark alliances between policymakers who want to regulate the online world and tech innovators who traditionally shun Beltway bureaucracies.
A growing number of companies, including Twitter Inc., are giving their workers' a pop quiz, testing security savvy by sending spoof phishing emails to see who bites.
Sansa Security, a provider of embedded security technologies, today announced that it has joined the Industrial Internet Consortium (IIC) in the hopes of accelerating the growth of the industrial Internet and Internet of Things (IoT) technologies.
Today, the White House will announce the creation of a new agency named the Cyber Threat Intelligence Integration Center (CTIIC) — which will be tasked with thwarting cyberattacks by sharing intelligence across other agencies in the event of a crisis.
Ever since the Internet blossomed in the 1990s, cybersecurity was built on the idea that computers could be protected by a digital quarantine. Now, as hackers routinely overwhelm such defenses, experts say cybersecurity is beyond due an overhaul.
TV technology, like Samsung's SmartTV, enables televisions to act on voice commands, but the TV sets can capture other words you say and transmit them to third parties. That's raising concerns about privacy.
- Page 1