Tag: security

Powered by TechAbout

125 Stories

4 Ways to Enhance Data Security in a BYOD Environment

4 Ways to Enhance Data Security in a BYOD Environment

More companies are creating Bring Your Own Device (BYOD) policies since remote workers and employees are upgrading their personal technology...

Tech giants can’t (or won’t) protect your data when push comes to shove

Tech giants can’t (or won’t) protect your data when push comes to shove

One of the most annoying parts of the Edward Snowden revelations isn't what everyone is focused on. It isn't that...

The US is right in its aggressive cyber-security efforts

The US is right in its aggressive cyber-security efforts

There's another uproar brewing over the Snowden leaks that has Americans taking to social media voicing their disapproval. They're classifying...

If you use the iOS app for Tumblr, change your password now

If you use the iOS app for Tumblr, change your password now

Tumblr didn't say it was hacked. They didn't say that any data was lost nor did they say that that...

How to easily protect your digital identity

How to easily protect your digital identity

Protecting your digital identity doesn't take a degree in computer science. Follow these 5 easy steps to secure your personal...

Ground-breaking technology to reduce shocking US burglary figures

Ground-breaking technology to reduce shocking US burglary figures

It’s an unfortunate and startling statistic: by the time you’ve finished reading this opening paragraph, someone in the US will...

Is social media privacy breached if it’s software that’s listening in?

Is social media privacy breached if it’s software that’s listening in?

Facebook and other social networks are employing keyword-sniffing programs that monitor our private communications such as chats and direct messages....

If drones are the future, what kind of future do they bring?

If drones are the future, what kind of future do they bring?

For years the U.S military has been using unmanned aerial vehicles, also known as UAVs or drones, to dominate its...

Where is your POS system vulnerable?

Where is your POS system vulnerable?

When it comes to point-of-sale, there are a few vulnerabilities that you probably didn't even know were there. In 2012, the...

Tips to protect your social media accounts

Tips to protect your social media accounts

Imagine the heart-stopping moment: You wake up, grab your phone, and your entire social media world has been flipped upside...

CISPA is dead but cybersecurity legislation will rear its ugly head again

CISPA is dead but cybersecurity legislation will rear its ugly head again

There's a rush going on in Washington DC right now. It has been going on for over 2 years now...

People care about Facebook privacy, just not enough to do anything about it

People care about Facebook privacy, just not enough to do anything about it

"Damn you, Facebook. I don't like you but everyone I know is on it. If I want to see pictures...

If you’re not afraid of #CISPA, you’re not really paying attention

If you’re not afraid of #CISPA, you’re not really paying attention

SOPA was a black eye for the US government. Nothing in the last few decades can compare to the complete...

CISPA is a comprehensive con job designed to pull the veil over the eyes of the world

CISPA is a comprehensive con job designed to pull the veil over the eyes of the world

There's a scene in The Matrix where Keanu Reeves' character, Neo, gets the tar beaten out of him by Agent...

As Krebs learned, if you’re going to out hackers, expect repercussions

As Krebs learned, if you’re going to out hackers, expect repercussions

As the saying loosely goes, "If you mess with the bull, you get the horns." That's a lesson that security...

How social engineering works

How social engineering works

When you combine the common old school methods of grifting with the technological advancements of hacking and social research, you...

The basics of online tracking

The basics of online tracking

There are two sad realities about online tracking. One reality is that the majority of people have their online activities...

Cell phone tracking, gun sniffing Predator B drones are flying over Americans today

Cell phone tracking, gun sniffing Predator B drones are flying over Americans today

It's not just a question of privacy. It's not simply a question of civil liberties. The technological capabilities and mandated...

A basic guide to getting hacked

A basic guide to getting hacked

Nobody wants to get hacked. The very concept is terrifying to many and at the least a personal violation to...

MyIDKey busts $150k on Kickstarter in 2 days

MyIDKey busts $150k on Kickstarter in 2 days

"Together we can solve this password problem now." That's the final line of the video that the team at myIDkey...