IBM Boosts Cyber Security Education Efforts
In the modern IT security landscape, universities are a key battle ground for both attackers and defenders. In recent years, attacks against university IT …
People trust NSA more than Google, survey says
People don’t always say what they think. Especially in business and love. Please, therefore, consider this question: whom would you trust more with your …
Facebook Offers $300K to Winners if Internet Security Prize 2015
Are you among the many advocates who intend to help make the world wide web a better and safer place for netizens? Facebook has …
Apple CEO had ‘very open’ talks with China on privacy, security
Apple CEO Tim Cook said talks with a Chinese official about online security were “very open,” just days after a Web monitoring site claimed …
VeraCrypt a Worthy TrueCrypt Alternative
If you’re reluctant to continue using TrueCrypt now that the open source encryption project has been abandoned, and you don’t want to wait for …
Kmart Stores Infected with Point-of-Sale Malware
Kmart recently announced that customer payment card numbers were exposed when its payment data systems were infected with “a new form of malware that …
Want to Beat Social Engineering? Training Is Key
Of all the misunderstandings out there about hacking and network security, one of the biggest may be that network intrusion and data theft are …
‘Bash Bug’ sets off Internet security alarm bells
A newly discovered bug leaving everything from smart appliances and thermostats to Internet servers and even home routers vulnerable to hackers has been classified …
9 Resources to Stay Current on Security Threats
In the world of IT security, threats are constantly evolving and shifting. It’s critical to stay abreast of the current (and hopefully future) threat …
Apple transparency reports allude to Patriot Act demands
Apple removed text from its latest transparency reports, which suggests that the company has received a top secret data demand. These so-called “warrant canaries” …
Recent Comments