Tag: security

Powered by TechAbout

125 Stories

@BurgerKing learns the hard way that your password must be secure

@BurgerKing learns the hard way that your password must be secure

It may never stop happening. Twitter accounts are hacked every hour of every day. Every now and then, a big...

It was the best hacking Facebook could have hoped for

It was the best hacking Facebook could have hoped for

No harm, no foul, lesson learned, you're data is safe. That's the message that Facebook gave its users with a...

Is the Cybersecurity Executive Order a wolf in sheep’s clothing?

Is the Cybersecurity Executive Order a wolf in sheep’s clothing?

Before anyone starts chanting that the conspiracy theorists were bound to find something in the Cybersecurity Executive Order to attack...

Duh. The easiest way to stop hackers is with real passwords.

Duh. The easiest way to stop hackers is with real passwords.

One of the most personal online violations that can occur to anyone is getting hacked. It could be a personal...

Broad range of presidential authority over cybersecurity is actually quite reasonable

Broad range of presidential authority over cybersecurity is actually quite reasonable

When a headline such as "Broad Powers Seen for Obama in Cyberstrikes" appears on the NY Times, my initial response...

7 apps every business should consider

7 apps every business should consider

As smartphones and tablets have unstoppably consolidated their vice-like grip on everyday life, no business would want to be left...

The 10 Most Notorious Hackers

The 10 Most Notorious Hackers

When we think of the term hacker, we are reminded of men in dark hoods, who hack into your systems,...

App security: how important is it?

App security: how important is it?

If you consider the amount of attempts to hack into government systems and databases, and how many times your personal...

Feel like James Bond with this secret security clock

Feel like James Bond with this secret security clock

Knowing the time is crucial, we always need to be somewhere and preferably on time than late, so that means...

Professional steps to ensure proper information security in organizations

Professional steps to ensure proper information security in organizations

The term “information security” may have different connotations, depending on the person who is asked about it. For an average...

Censorship on the internet: be your own watchdog

Censorship on the internet: be your own watchdog

There’s been a lot of focus, especially in the past year, on internet censorship. From the battle against online piracy...

Hacker group AntiSec leaks Apple device IDs to highlight FBI tracking

Hacker group AntiSec leaks Apple device IDs to highlight FBI tracking

If reports from the hacker group are to be believed, the FBI has over 12 million Unique Device Identifiers (UDIDs)...

Should two-factor authentication be utilized for all your accounts?

Should two-factor authentication be utilized for all your accounts?

The fear of hackers and privacy peeping toms has been quelled for the moment due to the unveiling of a...

Hotel keycards can be easily hacked in 200 milliseconds

Hotel keycards can be easily hacked in 200 milliseconds

With less than $50 of store-bought hardware and some programming, a hacker can gain instantaneous and untraceable access into over...

Top 5 security systems for 2012

Top 5 security systems for 2012

Quiz time: Did you know that a burglary occurs every 14.6 seconds in America? With the average dollar loss from...

Small businesses must take preventative measures to safeguard against hackers

Small businesses must take preventative measures to safeguard against hackers

Hackers are becoming increasingly clever and conniving, while small businesses remain shockingly naive about the threat they face from cyber-attacks....

BBC confuses HALO UNSC logo for United Nations Security Council

BBC confuses HALO UNSC logo for United Nations Security Council

The situation in Syria is serious. Amnesty International has accused the United Nations Security Council of failing to "match the...

WiFi security facts and figures

WiFi security facts and figures

WiFi has changed the world. We are no longer locked into proximity to wall outlets. We're not tied down by...

The history of encryption

The history of encryption

Sensitive data has always been a challenge to deliver securely. Even in the days of the Spartans, military commanders would...

Will online shopping ever be safe?

Will online shopping ever be safe?

As the madness of the holiday season dies down and the New Year gains pace, retailers will renew the cycle...