At the annual DEF CON hacking conference, hackers were given free reign to rip apart, reverse engineer and probe voting machines, some of which are currently in use across the US. Stephen has never hacked
There’s a very good chance that you know someone personally who’s had a run in with ransomware. If not, then you’ve certainly seen headlines about the kind of havoc it causes when it infects computers.
Hackers are a resourceful bunch, and they’ll look for any weakness that can be exploited to break in to a computer network. Once they’re in, they’ll use any available method to get the data they discover
Local and state government agencies from Oregon to Connecticut say they are using a Russian brand of security software despite the federal government’s instructions to its own agencies not to buy the over
Hackers who breached a Kansas Department of Commerce data system in March had access to more than 5.5 million Social Security numbers in 10 states, along with another 805,000 accounts that didn't include
There were several interesting tidbits of information about Tesla that came out of Elon Musk’s talk at the National Governors Association this weekend, like removing the possibility of a solar roof option
World’s oldest insurance market warns cost to global economy of cyber-attack could be as much as worst natural disasters Lloyd’s of London has warned that a serious cyber-attack could cost the global more
There were nearly 150,000 attempts to penetrate the voter-registration system on Election Day 2016, State Election Commission says To understand the scale of the hacking attempts against election systems
State lawmakers are trying to reenact the FCC’s scrapped privacy rules When the Congress voted in March to overturn landmark FCC privacy rules, consumers and advocacy groups were incensed by the decision.
If you're a Verizon customer who's called customer service in the past six months, it's probably a good idea to update your PIN, or the four-digit billing password that protects your account from people
It comes as no surprise that new trends (the cloud, big data, the internet of things) increase the attack surface. However, even widely known technologies can be a security pitfall. When it comes to enterprise