Black Friday 2014 Ads, Sales and Deals. Alert: Major Black Friday 2014 Sales are Live!
Menu
Walmart Black Friday Sale is Live Online

Walmart Black Friday Sale is Live Online

Top 100 Black Friday 2014 Deals You Need

Top 100 Black Friday 2014 Deals You Need

$79 32-inch, $119 40-inch and $199 50-inch TV Black Friday Deals are What You Want

$79 32-inch, $119 40-inch and $199 50-inch TV Black Friday Deals are What You Want

Best Buy Black Friday Sale is Live

Best Buy Black Friday Sale is Live

$199 Unlocked Fire Phone is Best Seller in Amazon Black Friday Sale

$199 Unlocked Fire Phone is Best Seller in Amazon Black Friday Sale

Computer security

Antivirus SoftMaker Symantec Splitting

Antivirus SoftMaker Symantec Splitting The company is Splitting Into Two Publicly-Traded Companies

Oct 26 2014, 12:08pm CDT

Symantec Splits Into Two

Symantec Splits Into Two Symantec Corporation, the maker of popular antivirus software products, is planning to split its business into two units, as it struggles to compete with younger security companies. In a statement, Symantec said...

Oct 10 2014, 3:00am CDT

Data breach exposes 4.5 million patients information to Chinese hackers

Data breach exposes 4.5 million patients information to Chinese hackers It turns out that 4.5 million Community Health Services patients personal data was exposed to Chinese hackers.

Aug 18 2014, 9:41pm CDT

Password Manager LastPass Service topples

Password Manager LastPass Service topples LastPass is one of the famous password managers for Android devices. However, users of this password manager are currently experiencing connection issues.

Aug 13 2014, 9:31am CDT

The Hottest Cheerleader Photos of 2014 Gallery
You Are Being Tracked Online By A Sneaky New Technology: Canvas Fingerprinting

You Are Being Tracked Online By A Sneaky New Technology: Canvas Fingerprinting You are likely being tracked online by a sneaky, new technology that works without your consent, and can track you even if you use anti-tracking toolbars or strict privacy settings. How is this possible? Historically,...

Jul 23 2014, 7:51am CDT

The World Needs Google Project Zero to be Real

The World Needs Google Project Zero to be Real If someone does something altruistic in security most stand up and applaud. But these days, such actions also tend to attract polemicists to the party. Especially of the cantankerous variety. Perhaps it’s no surprise...

Jul 16 2014, 6:10am CDT

AT&T customer records compromised

AT&T customer records compromised More than 500 people affected

Jun 15 2014, 1:07pm CDT

New OpenSSL Defects: Is this another Heartbleed?

New OpenSSL Defects: Is this another Heartbleed? OpenSSL is the same software that recently hit the headlines for the Heartbleed vulnerability. The 6 software defects (details available here) range in severity and impact and can allow an attacker to create a denial of...

Jun 6 2014, 3:20am CDT

Target: A Moment Of Truth Is Just Days Away

Target: A Moment Of Truth Is Just Days Away On June 11, when Target holds its annual meeting, shareholders will make a decision that could have far-reaching impact beyond this particular company or, for that matter, the entire retail sector. Institutional...

Jun 4 2014, 8:21am CDT

19-Year-Old Canadian Arrested for Heartbleed Hack

19-Year-Old Canadian Arrested for Heartbleed Hack The boy faces one count of Unauthorized Use of Computer and one count of Mischief in Relation to Data

Apr 17 2014, 1:00pm CDT

How Heartbleed Happened, The NSA And Proof Heartbleed Can Do Real Damage

How Heartbleed Happened Last week during the Heartbleed chaos I wrote two articles, one outlining how to stay safe and the other explaining what heartbleed actually is. As we enter this week it is clear that we are far from out of the woods,...

Apr 14 2014, 9:11am CDT

NSA reportedly used Heartbleed to gather intelligence, Agency denies it

NSA reportedly used Heartbleed to gather intelligence, Agency denies it A Bloomberg report earlier today said that the NSA intentionally kept the Heartbleed bug a secret in order to use it as a tool for intelligence.

Apr 12 2014, 4:36am CDT

Target exec's departure puts spotlight on CIOs NEW YORK (AP) — The departure of Target's chief information officer in the wake of the company's massive pre-Christmas data breach highlights the increased pressure facing executives who are charged with protecting...

Mar 5 2014, 11:51pm CST

Security Statistics Show That We Need To Reinvent Enterprise IT Often the conversation about the security of technology systems is parsed in terms that suggest the biggest risk vector comes from small organizations without the IT budget to ensure good security. However recent high...

Mar 4 2014, 1:26pm CST

China's president heads cybersecurity body BEIJING (AP) — Chinese President Xi Jinping has put himself in charge of a new body to coordinate cybersecurity, in a sign of Beijing's concern over its vulnerability to online attacks and its desire to retain tight...

Feb 27 2014, 11:01pm CST

Storing Data In Insecure Times

Storing Data In Insecure Times The Trusted Computing Group (TCG) session at the RSA Conference in San Francisco brought together proponents of standardized security technology with interested technology developers and end users.  In the...

Feb 27 2014, 2:31pm CST

New Virus Spreads Like The Common Cold - Via WiFi It started in the laboratory of a university in England. An airborne virus was cultivated. One that could spread like the common cold in densely populated areas, infecting all it came into contact with. It was called...

Feb 26 2014, 11:36am CST

Security Experts At RSA Decry Government Hacking There’s an old expression, “I’ve met the enemy and he is us.” When it comes to cyber-security, “us” may just stand for “U.S.” I’ve attended the RSA security conference for many years years and am accustomed to security...

Feb 25 2014, 4:21pm CST

AP Exclusive: Health law cybersecurity challenges WASHINGTON (AP) — As the Obama administration raced to meet its self-imposed deadline for online health insurance markets, security experts working for the government worried that state computer systems could become a...

Feb 25 2014, 1:51pm CST

Unofficially Fixing Apple's 'Gotofail' Mess And How To Stay Safe Many of you by now will have read about the Apple security issues in iOS and Mac OS X. Whilst we all wait patiently for Apple to comment on the issue, or better yet to fix it, users are left exposed to a bug that could...

Feb 24 2014, 6:06pm CST

Israeli's Cybereason: Sniffing for Malicious Operations

Israeli's Cybereason: Sniffing for Malicious Operations Thankfully, in spite of the media buildup going into the Sochi Olympics of 2014, the Games looks like it will wrap up  without a serious a security hitch (well, if you exclude Russia losing to the US in ice hockey...

Feb 21 2014, 3:51pm CST

Sumo Logic Delivers Enterprise Security Analytic Product Sumo Logic is a company that has slowly and quietly been building credibility for its machine data platform. Essentially Sumo Logic ingests all the information that technology systems spit out and delivers insights into...

Feb 21 2014, 11:21am CST

How To Prevent Becoming The Next Target

How To Prevent Becoming The Next Target Welcome to another installment in my cybersecurity for business owners series. Black Hat held a good webinar today on securing POS (Point of Sale) Systems.  I published an article on this topic (with input from one...

Feb 20 2014, 3:06pm CST

SANS Institute Report on Cyberthreat To Healthcare Industry

SANS Institute Report on Cyberthreat To Healthcare Industry In light of last weeks cyber-attack on Forbes (here), the release of new cyberthreat report yesterday specifically for healthcare was both timely – and sobering. Maliciously disrupting the business of a major media...

Feb 20 2014, 2:06am CST

SD Elements--A Solution To The Web App Security Conundrum The idea of web applications seems timeless, web apps have been around for a couple of decades already and yet we still keep hearing about security vulnerabilities in applications. Indeed the OWASP Top 10, a security...

Feb 14 2014, 11:10am CST

Taking Security Seriously after the Target Hack

Taking Security Seriously after the Target Hack Yesterday, U.S. Federal Reserve Governor Daniel Tarullo noted that “uniform disclosure” requirements were needed for banking institutions, so that their customers were made aware precisely when a data breach occurs....

Feb 7 2014, 12:15pm CST

How Secure is Your Health Data?

How Secure is Your Health Data? By Julie Steele Dr. Andrew Litt, Chief Medical Officer at Dell, made a thoughtful blog post last week about the trade-offs inherent in designing for both the security and accessibility of medical data, especially in an...

Feb 6 2014, 8:10am CST

Secure Your POS and Avoid a Target-Style Disaster

Secure Your POS and Avoid a Target-Style Disaster An estimated 70 million consumers were affected by a data breach impacting Target’s POS systems over the holidays. For Target, this signals the beginning of a gradual rebuilding of trust between itself and its billions...

Feb 4 2014, 1:02am CST

Yahoo Hacked And How To Protect Your Passwords

Yahoo Hacked And How To Protect Your Passwords Yahoo yesterday announced that Yahoo mail has been hacked and that at this time it has confirmed a number of users e-mail accounts have been compromised – you may be one of them (and if you are see below for my top tips...

Jan 31 2014, 5:30am CST

Get Ready for Your Next Generation Customers--Millennial Man

Survey Shows Most American Execs Are Out of Touch With IT? Many American executives are out of touch with their IT department, putting them at risk for security issues and data loss. When surveyed by PricewaterhouseCoopers, more than 9,300 high-ranking executives gave answers...

Jan 29 2014, 11:50pm CST

7 Israeli Security Companies Capable of Protecting the Sochi Olympics

7 Israeli Security Companies Capable of Protecting the Sochi Olympics The 22nd Winter Olympics are to be held in short time in Sochi, Russia. The news leading up to one of the world’s greatest sporting events hasn’t been good, to put it mildly. From stories about increased terrorist...

Jan 29 2014, 5:07pm CST

Antivirus Software is a Must

Antivirus Software is a Must The iAntivirus is one of the best antivirus softwares for Mac as it will not let any bug pass it by. Antivirus software is a must in today’s rapidly changing world where the dangers have become more and more complicated.

Jan 18 2014, 5:00am CST