Tag: security

Powered by TechAbout

72 Stories

Elon Musk Sued By SEC Over Twitters’ Shares

Elon Musk Sued By SEC Over Twitters’ Shares

SEC’s Lawsuit: The U.S. Securities and Exchange Commission (SEC) has filed a lawsuit against Elon Musk with the allegations that...

It’s all in the eyes. Security technology takes a bite out of car thefts.

It’s all in the eyes. Security technology takes a bite out of car thefts.

As long as there have been cars, trucks, SUV’s or any other thing that has four wheels and drives, there...

Is your password secure?

Is your password secure?

We all know the old rule of never recycling passwords, but how many of us actually follow this advice? In...

How can we beef up our cloud security?

How can we beef up our cloud security?

If you are thinking about using the cloud for your business but you’re concerned about security, there are new tools...

5 lessons from recent data breaches

5 lessons from recent data breaches

Technology has revolutionized the way we do everything, including shopping.  Now instead of having to go to the store and...

The future of home security?

The future of home security?

Home security is usually the last thing on our minds until we have a breach. Planning for problems before they...

Your data is at risk: 5 eays to protect it

Your data is at risk: 5 eays to protect it

Heartbleed made the rounds in the media as the security threat du jour. What made Heartbleed so dangerous was that...

4 technological bodyguards everyone should have

4 technological bodyguards everyone should have

Personal safety and security has always been important, and technology provides more options for it than ever before.From securing your...

Mt. Gox and the demise of Bitcoin

Mt. Gox and the demise of Bitcoin

Bitcoin has made about as many headlines -- for good reasons and bad -- as Osama Bin Laden did when...

4 Ways to Enhance Data Security in a BYOD Environment

4 Ways to Enhance Data Security in a BYOD Environment

More companies are creating Bring Your Own Device (BYOD) policies since remote workers and employees are upgrading their personal technology...

Tech giants can’t (or won’t) protect your data when push comes to shove

Tech giants can’t (or won’t) protect your data when push comes to shove

One of the most annoying parts of the Edward Snowden revelations isn't what everyone is focused on. It isn't that...

If you use the iOS app for Tumblr, change your password now

If you use the iOS app for Tumblr, change your password now

Tumblr didn't say it was hacked. They didn't say that any data was lost nor did they say that that...

How to easily protect your digital identity

How to easily protect your digital identity

Protecting your digital identity doesn't take a degree in computer science. Follow these 5 easy steps to secure your personal...

Is social media privacy breached if it’s software that’s listening in?

Is social media privacy breached if it’s software that’s listening in?

Facebook and other social networks are employing keyword-sniffing programs that monitor our private communications such as chats and direct messages....

Where is your POS system vulnerable?

Where is your POS system vulnerable?

When it comes to point-of-sale, there are a few vulnerabilities that you probably didn't even know were there. In 2012, the...

Tips to protect your social media accounts

Tips to protect your social media accounts

Imagine the heart-stopping moment: You wake up, grab your phone, and your entire social media world has been flipped upside...

People care about Facebook privacy, just not enough to do anything about it

People care about Facebook privacy, just not enough to do anything about it

"Damn you, Facebook. I don't like you but everyone I know is on it. If I want to see pictures...

The basics of online tracking

The basics of online tracking

There are two sad realities about online tracking. One reality is that the majority of people have their online activities...

MyIDKey busts $150k on Kickstarter in 2 days

MyIDKey busts $150k on Kickstarter in 2 days

"Together we can solve this password problem now." That's the final line of the video that the team at myIDkey...

Duh. The easiest way to stop hackers is with real passwords.

Duh. The easiest way to stop hackers is with real passwords.

One of the most personal online violations that can occur to anyone is getting hacked. It could be a personal...