In the manufacturing industry, theft of intellectual property means a business can lose its "secret ingredient" that sets a product apart from the competition, and dilutes the brand. Often firms don’t know there has been a breach until a knock off product or service surfaces that is surprisingly similar to the company’s prized product.
It's been seven years since a major change in airline security, but restrictions for carry-on...
Here's a deeper look into the top trending stories in manufacturing today based on reader...
Over time, business has gotten a lot smarter when it comes to protecting enterprise technology...
Last year, more than 1.5 million Americans had their smartphones stolen, and though there is a solution known as a "kill switch," the idea is meeting heavy resistance from the industry.
Samsung Electronics, the world's largest mobile phone manufacturer, has proposed installing a built-in anti-theft measure known as a "kill switch" that would render stolen or lost phones inoperable, but the biggest U.S. carriers have rejected the idea, according to San Francisco's top prosecutor.
Here's a deeper look into the top trending stories in manufacturing today based on reader feedback: Coffee spat resolution; anti-theft tech for cellphones; how an ERP system could hamper revenue growth and a 3D printed car.
With more than a million cellphones stolen every year, attorney generals from 31 states are demanding that cellphone makers install technology that would make the devices useless to thieves.
Some Purdue University researchers are working on technology that could see all those passwords that computer users must punch in replaced with steps such as iris and fingerprint scans.
After decades of outsourcing, the resurgence in domestic manufacturing is now America’s favorite comeback story. Factors that once drove companies overseas — including labor and energy costs — are no longer considered insurmountable obstacles. Yet one troubling trend could signal a major complication for returning manufacturers: our nation’s increasing reliance on unstable supply chains of imported minerals.
Make no mistake: big things come in small packages. That’s no secret to cyber thieves. They often take the path of least resistance and see small and medium-sized businesses as easy prey since they don’t often have sufficient layers of protection around their systems.
The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, The Washington Post reported Wednesday, citing documents obtained from former NSA contractor Edward Snowden.
A group that includes Microsoft and Oracle says Google's bid to settle its antitrust case with the European Union is insufficient.
Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, has reported that DDoS perpetrators changed tactics in Q3 2013 to boost attack sizes and hide their identities. This observation is one of many key findings found in the company’s Q3 2013 Global DDoS Attack Report.
Smartphones represent an easy means for a hacker to gain access to your corporate network. A Mobile Application Security Assessment should look at the security and compliance risks of your entire solution from the app on the device to the backend systems that the app connects to, as well as ways data flows between them.
European Union lawmakers on Monday were set to hold a first vote on sweeping new data protection rules to strengthen online privacy and outlaw most data transfers to other countries' authorities to prevent spying.
The former chief financial officer of an Orange County technology company was sentenced Wednesday to more than four years in prison for stealing roughly $15 million from the company.
A federal grand jury in St. Louis has indicted a former Boeing Co. procurement officer on charges he gave inside information to a Washington state shop owner and others, netting the subcontractors more than $3.5 million in orders for aircraft parts.
Vulnerabilities in cameras connected to the Internet and in wireless routers could enable hackers to watch you.
Perdew's company, Novice to Advanced Marketing Systems, provides marketing training through in-person workshops and online. The attack forced the company to shut down its site for six weeks, and cost $75,000 in lost revenue and expenses to overhaul its computer system.
The VIEVU2 is rugged and waterproof, encased in military grade anodized aluminum housing for durability and streams real-time HD video while connected to a Smartphone or Wi-Fi network.
Mobile solutions have a huge potential to drastically increase the efficiency of field workers and save big money for companies in a range of industries. However, the implementation of mobile solutions is filled with pitfalls.
With sensors and networking technology being strapped to nearly every machine around the globe at a blistering pace, estimates projecting 50 billion connected devices by 2020 may be too conservative.
Top prosecutors in San Francisco and New York and the mayor of London are urging iPhone users to download Apple's new iOS 7 operating system that includes a feature they believe might curb a rash of thefts.
Passcodes are such a pain that I've relaxed the security settings on my Android phone. I'm willing to forgo the extra safety, just so I'm asked to punch in the code less often. The fingerprint sensor alone is worth the extra $100 you'll pay for the 5S over an iPhone 5C.
Apple announced Tuesday that their new models, the 5C and the 5S, will use a fingerprint scan instead of a passcode. Editor of Fast Company Robert Safian joins "CBS This Morning" to discuss the implications of the new technology.
The U.S. National Security Agency is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users' data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel.
The Syrian army may not be able to match U.S. military muscle but security analysts say with cyber-capable allies, they could hack into infrastructure with dangerous potential.
A former NASA engineer who pleaded guilty to conspiracy in a copyright infringement scheme led by two Chinese nationals was sentenced to probation Wednesday.
- Page 1