The machine-to-machine (M2M) movement. The Internet of Things (IoT). The Internet of Everything (IoE). Each term may have its subtle differences, but at their core, they all involve connected devices that share information to enhance their intelligence, capabilities and operation.
- By Jeremy Brecher
- Dec 01, 2014
The survey was conducted by the Pew Research Center.
- By Matt Holden
- Nov 12, 2014
Luxury hotels have been the target of malware attacks.
- By Matt Holden
- Nov 10, 2014
The company also says the hackers got access via a vendor.
- By Matt Holden
- Nov 07, 2014
Wirelurker sneaks onto computers using unauthorized Chinese apps.
- By Ginger Hill
- Nov 06, 2014
IBM conducted a survey of nearly 150 security chiefs.
- By Matt Holden
- Nov 05, 2014
The European Network and Information Security Agency coordinated an exercise based in Athens.
- By Matt Holden
- Oct 31, 2014
Security Today and Protect America have partnered to bring you a fun and festive Halloween Twitter chat about keeping parents, kids and pets safe during this time of witches flying on broomsticks, the pitter-pat of little ghost and ghoul feet and candy, candy, candy! Join us to learn some awesome safety tips as well as the chance to win treats by answering trivia questions throughout the chat! No tricks here, just treats!
- By Ginger Hill
- Oct 31, 2014
Customers are worried about the safety of their banking information.
- By Matt Holden
- Oct 30, 2014
The hackers are thought to be working for the Russian government.
- By Matt Holden
- Oct 29, 2014
Tim Cook said the talks were ‘very open’
- By Matt Holden
- Oct 24, 2014
It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world.
- By Ginger Hill
- Oct 23, 2014
Insert USB device then tap it when prompted by Chrome.
- By Ginger Hill
- Oct 21, 2014
Stores in the Northeastern United States may have been attacked
- By Matt Holden
- Oct 21, 2014
Learn step-by-step how to set up a Twitter account along with reasons why you should.
- By Ginger Hill
- Oct 17, 2014
The encryption techniques might be regulated by the government in order to maintain control.
- By Matt Holden
- Oct 17, 2014
Used in encryption technology and can allow attackers to take over accounts, such as email and banking.
- By Ginger Hill
- Oct 16, 2014
Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!
- By Ginger Hill
- Oct 16, 2014
The company is urging users to enable two-step authentication.
- By Matt Holden
- Oct 15, 2014
The hackers are targeting the Ukrainian government, a European government agency, two European companies and a United States scholar.
- By Matt Holden
- Oct 14, 2014