Menu
Trending: Super Bowl 2015 Ads for Geeks More Topics: Apple | Cars | TV Shows | Politics
Watch all Super Bowl 2015 Ads Online Sexiest Super Bowl 2015 Ad: Carl's Jr. Superbowl Ad with Charlotte McKinney Bud Light Super Bowl 2015 Ad Life-Sized PacMan Budweiser Super Bowl 2015 Ad Lost Dog Budweiser Super Bowl 2015 Ad Beer Run All Super Bowl 2015 Advertisers All Celebrities that appear in Super Bowl 2015 Commercials All Super Bowl 2015 Ad News, Teasers and Super Bowl Highlights
Carl's Jr. Super Bowl 2015 Ad stars Charlotte McKinney

Carl's Jr. Super Bowl 2015 Ad stars Charlotte McKinney

Budweiser Super Bowl 2015 Ad Beer Run stars a Clydesdale

Budweiser Super Bowl 2015 Ad Beer Run stars a Clydesdale

Microsoft's HoloLens starts the Era of Holographic Computing

HoloLens starts the Era of Holographic Computing

Budweiser Super Bowl 2015 Ad Lost Dog Teaser Released

Budweiser Super Bowl 2015 Ad Lost Dog Teaser Released

2015 Pro Bowl Cheerleader

2015 Pro Bowl Cheerleaders

Computer security

Antivirus SoftMaker Symantec Splitting

Antivirus SoftMaker Symantec Splitting The company is Splitting Into Two Publicly-Traded Companies

Oct 26 2014, 12:08pm CDT

Symantec Splits Into Two

Symantec Splits Into Two Symantec Corporation, the maker of popular antivirus software products, is planning to split its business into two units, as it struggles to compete with younger security companies. In a statement, Symantec said...

Oct 10 2014, 3:00am CDT

Data breach exposes 4.5 million patients information to Chinese hackers

Data breach exposes 4.5 million patients information to Chinese hackers It turns out that 4.5 million Community Health Services patients personal data was exposed to Chinese hackers.

Aug 18 2014, 9:41pm CDT

Password Manager LastPass Service topples

Password Manager LastPass Service topples LastPass is one of the famous password managers for Android devices. However, users of this password manager are currently experiencing connection issues.

Aug 13 2014, 9:31am CDT

You Are Being Tracked Online By A Sneaky New Technology: Canvas Fingerprinting

You Are Being Tracked Online By A Sneaky New Technology: Canvas Fingerprinting You are likely being tracked online by a sneaky, new technology that works without your consent, and can track you even if you use anti-tracking toolbars or strict privacy settings. How is this possible? Historically,...

Jul 23 2014, 7:51am CDT

The World Needs Google Project Zero to be Real

The World Needs Google Project Zero to be Real If someone does something altruistic in security most stand up and applaud. But these days, such actions also tend to attract polemicists to the party. Especially of the cantankerous variety. Perhaps it’s no surprise...

Jul 16 2014, 6:10am CDT

AT&T customer records compromised

AT&T customer records compromised More than 500 people affected

Jun 15 2014, 1:07pm CDT

New OpenSSL Defects: Is this another Heartbleed?

New OpenSSL Defects: Is this another Heartbleed? OpenSSL is the same software that recently hit the headlines for the Heartbleed vulnerability. The 6 software defects (details available here) range in severity and impact and can allow an attacker to create a denial of...

Jun 6 2014, 3:20am CDT

Super Bowl 2015 Ads
Target: A Moment Of Truth Is Just Days Away

Target: A Moment Of Truth Is Just Days Away On June 11, when Target holds its annual meeting, shareholders will make a decision that could have far-reaching impact beyond this particular company or, for that matter, the entire retail sector. Institutional...

Jun 4 2014, 8:21am CDT

19-Year-Old Canadian Arrested for Heartbleed Hack

19-Year-Old Canadian Arrested for Heartbleed Hack The boy faces one count of Unauthorized Use of Computer and one count of Mischief in Relation to Data

Apr 17 2014, 1:00pm CDT

How Heartbleed Happened, The NSA And Proof Heartbleed Can Do Real Damage

How Heartbleed Happened Last week during the Heartbleed chaos I wrote two articles, one outlining how to stay safe and the other explaining what heartbleed actually is. As we enter this week it is clear that we are far from out of the woods,...

Apr 14 2014, 9:11am CDT

NSA reportedly used Heartbleed to gather intelligence, Agency denies it

NSA reportedly used Heartbleed to gather intelligence, Agency denies it A Bloomberg report earlier today said that the NSA intentionally kept the Heartbleed bug a secret in order to use it as a tool for intelligence.

Apr 12 2014, 4:36am CDT

Target exec's departure puts spotlight on CIOs NEW YORK (AP) — The departure of Target's chief information officer in the wake of the company's massive pre-Christmas data breach highlights the increased pressure facing executives who are charged with protecting...

Mar 5 2014, 11:51pm CST

Security Statistics Show That We Need To Reinvent Enterprise IT Often the conversation about the security of technology systems is parsed in terms that suggest the biggest risk vector comes from small organizations without the IT budget to ensure good security. However recent high...

Mar 4 2014, 1:26pm CST

China's president heads cybersecurity body BEIJING (AP) — Chinese President Xi Jinping has put himself in charge of a new body to coordinate cybersecurity, in a sign of Beijing's concern over its vulnerability to online attacks and its desire to retain tight...

Feb 27 2014, 11:01pm CST

Storing Data In Insecure Times

Storing Data In Insecure Times The Trusted Computing Group (TCG) session at the RSA Conference in San Francisco brought together proponents of standardized security technology with interested technology developers and end users.  In the...

Feb 27 2014, 2:31pm CST

New Virus Spreads Like The Common Cold - Via WiFi It started in the laboratory of a university in England. An airborne virus was cultivated. One that could spread like the common cold in densely populated areas, infecting all it came into contact with. It was called...

Feb 26 2014, 11:36am CST

Security Experts At RSA Decry Government Hacking There’s an old expression, “I’ve met the enemy and he is us.” When it comes to cyber-security, “us” may just stand for “U.S.” I’ve attended the RSA security conference for many years years and am accustomed to security...

Feb 25 2014, 4:21pm CST

AP Exclusive: Health law cybersecurity challenges WASHINGTON (AP) — As the Obama administration raced to meet its self-imposed deadline for online health insurance markets, security experts working for the government worried that state computer systems could become a...

Feb 25 2014, 1:51pm CST

Unofficially Fixing Apple's 'Gotofail' Mess And How To Stay Safe Many of you by now will have read about the Apple security issues in iOS and Mac OS X. Whilst we all wait patiently for Apple to comment on the issue, or better yet to fix it, users are left exposed to a bug that could...

Feb 24 2014, 6:06pm CST

Israeli's Cybereason: Sniffing for Malicious Operations

Israeli's Cybereason: Sniffing for Malicious Operations Thankfully, in spite of the media buildup going into the Sochi Olympics of 2014, the Games looks like it will wrap up  without a serious a security hitch (well, if you exclude Russia losing to the US in ice hockey...

Feb 21 2014, 3:51pm CST

Sumo Logic Delivers Enterprise Security Analytic Product Sumo Logic is a company that has slowly and quietly been building credibility for its machine data platform. Essentially Sumo Logic ingests all the information that technology systems spit out and delivers insights into...

Feb 21 2014, 11:21am CST

How To Prevent Becoming The Next Target

How To Prevent Becoming The Next Target Welcome to another installment in my cybersecurity for business owners series. Black Hat held a good webinar today on securing POS (Point of Sale) Systems.  I published an article on this topic (with input from one...

Feb 20 2014, 3:06pm CST

SANS Institute Report on Cyberthreat To Healthcare Industry

SANS Institute Report on Cyberthreat To Healthcare Industry In light of last weeks cyber-attack on Forbes (here), the release of new cyberthreat report yesterday specifically for healthcare was both timely – and sobering. Maliciously disrupting the business of a major media...

Feb 20 2014, 2:06am CST

SD Elements--A Solution To The Web App Security Conundrum The idea of web applications seems timeless, web apps have been around for a couple of decades already and yet we still keep hearing about security vulnerabilities in applications. Indeed the OWASP Top 10, a security...

Feb 14 2014, 11:10am CST

Taking Security Seriously after the Target Hack

Taking Security Seriously after the Target Hack Yesterday, U.S. Federal Reserve Governor Daniel Tarullo noted that “uniform disclosure” requirements were needed for banking institutions, so that their customers were made aware precisely when a data breach occurs....

Feb 7 2014, 12:15pm CST

How Secure is Your Health Data?

How Secure is Your Health Data? By Julie Steele Dr. Andrew Litt, Chief Medical Officer at Dell, made a thoughtful blog post last week about the trade-offs inherent in designing for both the security and accessibility of medical data, especially in an...

Feb 6 2014, 8:10am CST

Secure Your POS and Avoid a Target-Style Disaster

Secure Your POS and Avoid a Target-Style Disaster An estimated 70 million consumers were affected by a data breach impacting Target’s POS systems over the holidays. For Target, this signals the beginning of a gradual rebuilding of trust between itself and its billions...

Feb 4 2014, 1:02am CST

Yahoo Hacked And How To Protect Your Passwords

Yahoo Hacked And How To Protect Your Passwords Yahoo yesterday announced that Yahoo mail has been hacked and that at this time it has confirmed a number of users e-mail accounts have been compromised – you may be one of them (and if you are see below for my top tips...

Jan 31 2014, 5:30am CST

Get Ready for Your Next Generation Customers--Millennial Man

Survey Shows Most American Execs Are Out of Touch With IT? Many American executives are out of touch with their IT department, putting them at risk for security issues and data loss. When surveyed by PricewaterhouseCoopers, more than 9,300 high-ranking executives gave answers...

Jan 29 2014, 11:50pm CST

7 Israeli Security Companies Capable of Protecting the Sochi Olympics

7 Israeli Security Companies Capable of Protecting the Sochi Olympics The 22nd Winter Olympics are to be held in short time in Sochi, Russia. The news leading up to one of the world’s greatest sporting events hasn’t been good, to put it mildly. From stories about increased terrorist...

Jan 29 2014, 5:07pm CST

Antivirus Software is a Must

Antivirus Software is a Must The iAntivirus is one of the best antivirus softwares for Mac as it will not let any bug pass it by. Antivirus software is a must in today’s rapidly changing world where the dangers have become more and more complicated.

Jan 18 2014, 5:00am CST

The Target Data Breach Is Becoming A Nightmare

The Target Data Breach Is Becoming A Nightmare Over the past month, details about the breadth of the Target data breach have continued to emerge.  It’s not a pretty story.  Bad enough when it appeared that through some means, hackers had gotten data all the way from...

Jan 17 2014, 1:51pm CST

I4U news

Cybersecurity chief had qualms over health website HHS cybersecurity chief says health care website tests didn't follow security 'best practices' WASHINGTON (AP) — The top cybersecurity officer for the Health and Human Services Department said he was...

Jan 16 2014, 2:36am CST

So You Found An Obamacare Website Is Hackable. Now What?

So You Found An Obamacare Website Is Hackable. Now What? Two months ago, L.A.-based security researcher Kristian Erik Hermansen was signing up for Obamacare via the Covered California site. Given his background in finding vulnerabilities in software and websites, spotting...

Jan 15 2014, 6:01pm CST

Forget Fingerprints, Your Face Is A Security Key

Forget Fingerprints, Your Face Is A Security Key No system is unhackable. But to hear Hector Hoyos describe his company’s latest security offering, it’s hard to imagine cyber-intruders easily breaking through the barriers he’s created. He’s unveiling it to the world...

Jan 7 2014, 7:56am CST

I4U news

It's Time To Change Your Passwords And Here's How The first of the year is a good time for many things, one of which is changing passwords. Most people hate the idea of changing passwords, but it is a necessary evil. The proliferation of key loggers, phishing sites,...

Jan 5 2014, 10:01pm CST

The Product Management Logic of the FireEye-Mandiant Deal

The Product Management Logic of the FireEye-Mandiant Deal The coverage of FireEye’s acquisition of Mandiant in most business publications (see reports in the New York Times and Wall Street Journal) has focused on the dynamic personalities of the CEOs rather than on the...

Jan 3 2014, 12:16pm CST