Apple has posted a new security warning for users of its iCloud online storage service amid reports of a concerted effort to steal passwords and other data from people who use the popular service in China.
The Federal Trade Commission on Tuesday named an outspoken Internet privacy expert, Ashkan...
Staples is looking into a potential credit card data breach and has been in touch with law...
It seems that many in manufacturing operations and IT are being tasked with quelling security...
JPMorgan Chase's CEO Jamie Dimon says that more coordination between businesses and government is needed to combat the rising threat of cyberattacks.
Businesses and governments around the world increasingly are turning to voice biometrics, or voiceprints, to pay pensions, collect taxes, track criminals and replace passwords.
Security software maker Symantec is the latest company to announce plans to split itself into two.
A two-step authentication application called Authy, which is backed by Cameron Winkelvoss, already has 1 million users.
JPMorgan Chase reported hackers have stolen information from about 83 million customers. Anthony Mason reports how these cyber attacks are happening far more often than most people realize.
While the newest Apple and Google smartphones will automatically encrypt data stored on them, that won’t keep U.S. law enforcement and intelligence agencies from obtaining evidence linked to the devices.
JPMorgan said Thursday that the breach compromised customer information pertaining to roughly 76 million households and 7 million small businesses.
Google's Eric Schmidt and Jonathan Rosenberg tell Christine Romans why Google is the safest place on the web, and why they hired Sheryl Sandberg without having a job for her.
Just because you have the right services in place with smart people watching over and securing your data, don’t ever think the job is done. A new threat has arrived, and it is much worse than Heartbleed.
Two members of an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers pleaded guilty to conspiracy charges Tuesday in federal court in Delaware.
Many industrial operations struggle to find the right approach to protect their assets. Instead of designing protections into their systems, some manufacturers wrongly rely on their system’s complexity to keep assets hidden.
Jose Pagliery breaks down the shellshock vulnerability and explains which devices could be affected.
In the war on cybercrime, Charles Largay is training the next generation of cops on the beat. By showing them how to break into computer networks, Largay is teaching his students to think like the bad guys.
New warnings are emerging of a security flaw known as the "Bash" bug, which cyber experts say may pose a serious threat to computers.
Your supply chain is the biggest source of risk in your entire operation. Unfortunately, there are many day-to-day aspects that you’ll never be able to completely control or manage.
Police say eight workers at a Caterpillar plant in Texas are accused of stealing more at least $160,000 in parts from the company.
Apple has tightened its technological security so not even the company can pry into a password-protected iPhone or iPad, a move meant to reassure the millions of people who are increasingly storing vital pieces of their lives on the devices.
For business travelers going to foreign lands, the old “Don’t leave home without it” slogan should be brought back with one slight change: “Leave home without it.”
The drive to build data centers underground arises from fears about natural disasters, terrorism and security intrusions, plus they offer a number of advantages for organizations needing maximum data security.
Shares of Home Depot sank before the opening bell Tuesday after confirming that its payment systems had been hacked, potentially exposing millions of shoppers who used credit and debit cards at its more than 2,000 U.S. and Canadian stores.
Apple is planning to add more security measures to help protect its users following a celebrity photo hacking incident.
Every company wants to simplify its business costs and increase revenue but, often, the different applications or solutions available are expensive, vulnerable and too complicated to implement in-house.
Whether famous or seemingly anonymous, people from all walks of life put all sorts of things online or into cloud-based storage systems, from vital financial information to the occasional nude photo. Periodic cases of hacking fuel outrage, but there's no retreat from digital engagement or any imminent promise of guaranteed privacy.
Home Depot may be the latest retailer to suffer a major credit card data breach.
This episode of The IoT Uplink, a new video series examining all the factors driving, influencing and adding to the complexity of the Internet of Things movement, focuses on the growing need for standards and security in the IoT realm.
- Page 1