security

EyeLock

It’s all in the eyes. Security technology takes a bite out of car thefts.

As long as there have been cars, trucks, SUV’s or any other thing that has four wheels and drives, there have...
Avatar of Sara Dean Sara Dean
1 min read
16010 female hands typing on a laptop keyboard pv 728 300

Is your password secure?

We all know the old rule of never recycling passwords, but how many of us actually follow this advice? In a...
Avatar of Brian Wallace Brian Wallace
45 sec read
Smartphone Security

How can we beef up our cloud security?

If you are thinking about using the cloud for your business but you’re concerned about security, there are new tools that...
Avatar of Brian Wallace Brian Wallace
45 sec read
Security

5 lessons from recent data breaches

Technology has revolutionized the way we do everything, including shopping.  Now instead of having to go to the store and hunt...
Avatar of Brian Wallace Brian Wallace
36 sec read
Bio Security

The future of home security?

Home security is usually the last thing on our minds until we have a breach.  Planning for problems before they arise...
Avatar of Brian Wallace Brian Wallace
47 sec read
Data at Risk

Your data is at risk: 5 eays to protect it

Heartbleed made the rounds in the media as the security threat du jour. What made Heartbleed so dangerous was that the...
Avatar of John Horn John Horn
2 min read
Stun Gun Cell Phone

4 technological bodyguards everyone should have

Personal safety and security has always been important, and technology provides more options for it than ever before. From securing your...
Avatar of DJ Miller DJ Miller
2 min read
Mt Gox

Mt. Gox and the demise of Bitcoin

Bitcoin has made about as many headlines — for good reasons and bad — as Osama Bin Laden did when American...
Avatar of DJ Miller DJ Miller
2 min read
Enhance Data Security BYOD Environment

4 Ways to Enhance Data Security in a BYOD Environment

More companies are creating Bring Your Own Device (BYOD) policies since remote workers and employees are upgrading their personal technology with...
Avatar of Drew Hendricks Drew Hendricks
2 min read
NSA A Few Good Men

Tech giants can’t (or won’t) protect your data when push comes to shove

One of the most annoying parts of the Edward Snowden revelations isn’t what everyone is focused on. It isn’t that the...
Avatar of Lorie Wimble Lorie Wimble
3 min read
Tumblr Hacker

If you use the iOS app for Tumblr, change your password now

Tumblr didn’t say it was hacked. They didn’t say that any data was lost nor did they say that that there...
Avatar of Sal McCloskey Sal McCloskey
34 sec read
Microsoft OS

How to easily protect your digital identity

Protecting your digital identity doesn’t take a degree in computer science. Follow these 5 easy steps to secure your personal information...
Avatar of Dylan Adams Dylan Adams
1 min read
Virtual Privacy

Is social media privacy breached if it’s software that’s listening in?

Facebook and other social networks are employing keyword-sniffing programs that monitor our private communications such as chats and direct messages. When...
Avatar of JD Rucker JD Rucker
2 min read
POS Hacking

Where is your POS system vulnerable?

When it comes to point-of-sale, there are a few vulnerabilities that you probably didn’t even know were there. In 2012, the retail...
Avatar of Brian Wallace Brian Wallace
51 sec read
Social Media Protection

Tips to protect your social media accounts

There are a few risks that come with social media. Few of them are very serious, but it is always a...
Avatar of Kate Funk Kate Funk
2 min read
Privacy Concern

People care about Facebook privacy, just not enough to do anything about it

“Damn you, Facebook. I don’t like you but everyone I know is on it. If I want to see pictures of...
Avatar of Louie Baur Louie Baur
46 sec read