The ongoing battle over privacy is not confined to online. Besides security cameras and smart cars, cellphones are enabling retailers to track shoppers in stores.
The almost magical capabilities of mobile devices help use be productive and collaborative, entertained and connected, are coming to vehicles along with the risks and dangers.
Information technology shops worry that the current crop of twentysomethings are not sufficiently security conscious.
The security community agrees it's important to protect critical infrastructure, but it's not clear which sectors are critical.
An upgraded 'Great Firewall of China' can reportedly block the encrypted communications methods used by VPN systems.
It's the most dangerous time of the year, say many tech security experts, who have noticed an upswing of hacking and cyberattacks around the holidays.
Defense Security Service report says attacks were up 75 percent in one year.
As the use of smart connected devices expands, so do threats because while they may not look like computers, they are.
'Tis the season to be careful. That should be no surprise. Given that the online holiday shopping season is peaking, cybercriminals would be expected to ramp up their efforts as well.
The latest break-in at the International Atomic Energy Agency demonstrates that the public still doesn't buy criminal acts in support of "good causes."
A study by ID Analytics' ID:A Labs found more than 10,000 ID fraud rings, some of them led by career criminals, but a surprising number amounting to mom-and-pop operations involving friends and family.
The only effective defense is to 'build security in' from the ground up, critics say in response to DoD, DHS comments
Apache, Yahoo overriding tracking settings -- off by default -- in Microsoft's new Internet Explorer browser
Security vendors Sophos and Kaspersky Lab both warn of scam emails using the names of well-established companies to try to lure victims to malware sites. The scheme is obvious, or ought to be—the bad guys figure that if they use a trusted name, victims will trust the link.
Given statements from U.S. officials that the nation is facing a "digital Pearl Harbor," this sounds like the impossible dream come true -- the cyber version of a Star Wars force field.
Articles by Taylor ArmerdingNext Page