Lenovo, Toshiba and Dell advise users to remove software due to security issues.
- By Sydny Shepard
- Dec 07, 2015
VTech has been hacked putting the personal information of millions of people, including children, at risk.
- By Sydny Shepard
- Dec 01, 2015
To automakers, they are building a world of safer cars, but to data security researchers, they are creating high velocity weapons.
- By Sydny Shepard
- Nov 19, 2015
Microsoft plans to invest in new security plan after several high-profile cyber attacks.
- By Sydny Shepard
- Nov 18, 2015
Avast researchers have found a number of vulnerabilities in Smart TVs.
- By Sydny Shepard
- Nov 13, 2015
Fast-growing cyber security software firm attracts new clients in UK and US.
Despite the growing cyber attacks, the health care industry continues to shortchange Americans when it comes to data security.
- By Sydny Shepard
- Nov 12, 2015
Federal authorities say three people have been charged in the largest theft of consumer data from a U.S. financial institution in history.
- By Sydny Shepard
- Nov 11, 2015
Dropbox creates Enterprise version of app to combat their reputation of being a low security file-sharing platform.
- By Sydny Shepard
- Nov 06, 2015
VSaaS solutions have been around for a while now, offering what many see as more efficient software maintenance and support for their surveillance systems.
- By Dan Cremins
- Nov 02, 2015
Retailers are deciding not to change over to credit card chip transactions until after the holiday season.
- By Sydny Shepard
- Nov 02, 2015
With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.
- By Pete Metzger
- Nov 02, 2015
A layered approach to network security is the most reliable way of ensuring peace of mind against Advanced Persistent Threat (APT) forms of cyberattacks because no modern company can afford the surefire method of protection
- By Michél Bechard
- Nov 01, 2015
In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.
- By Denny Heaberlin
- Nov 01, 2015
Poor security habits from employees could lead to a cybersecurity breach.
- By Sydny Shepard
- Oct 29, 2015
Cisco's acquisition of Lancope predicted to boost Cisco’s cybersecurity threat defense capabilities.
- By Sydny Shepard
- Oct 28, 2015
Some of technologies leading revolutionaries disregard the Cyber Security Bill as a legitimate solution to the data breaches seen in recent news.
There are many concerns when transferring to the cloud and security is one of the biggest, followed closely by concerns about complying with regulations and losing control of data according to a recent study by 451 Research.
A new study shows how mobile networks around the world have been hacked via bugs in the code.
- By Matt Holden
- Oct 15, 2015
After an attack on the App Store, iPhone and iPad users in China and Taiwan are still at risk.
- By Matt Holden
- Oct 05, 2015