Threat Response Attackers are using online dating services to convince lonely people to send nude photos, and that's when the blackmail begins.
Threat Response Half of all Android phones still run Android 4.2 or older. If they also buy from third-party app stores, they could be vulnerable to a hijacking app. This scanner will tell you if your phone is at risk.
Threat Response Oh Hillary: You really thought using your own phone and your personal email address while serving as Secretary of State would be OK?
Threat Response Your passwords are one kind of secret you probably need to keep, even from trusted loved ones. A new survey from Intel Security reveals people's habits and the risks they might be taking.
Threat Response There's help for the 80 million individuals who could be affected by the Anthem data breach. A few proactive steps can help you stay alert to any attempted crimes using your personal data.
Threat Response Ironically, the same employees surveyed who were often lax on corporate security were nevertheless vigilant about their own digital security.
Threat Response Calls for better information sharing and data breach reporting, and better cybercrime-fighting tools, could hamper innovation or infringe on privacy, experts caution.
Threat Response Attackers may be able to infiltrate the network, but if organizations properly employed two-factor authentication the data would still be safe.
Threat Response Box's corporate customers need help managing the relentless growth of online storage and applications, let alone the mobile devices that access them.
Threat Response Okay, but why? Data collected by cloud storage provider iDrive demonstrates that iOS users are more likely to back up data and use available privacy controls than their Android-using peers.