Even though the Internet of Things (IoT) is still quite new, hackers are relying on some pretty old vulnerabilities – like a lack of encryption -- to compromise IoT devices.A research team from Bast...
Dr. Eli David used to conduct an experiment with students in his AI neural networks and evolutionary computation classes by randomly throwing a pen at a student without warning."I've been doing this...
The Internet of Things promises added convenience, efficiency - and insecurity.This year will see a big increase in attacks on "things" connected to the IoT, believe many se...
Traditional security techniques are no longer enough. By the time malware is spotted and added to antivirus (AV) signatures, the bad guys have either gotten in and wreaked ...
Facebook recently caught the attention of security professionals with the announcement of its new Threat Exchange, a special social networking platform (currently in beta) that allows companies to s...
Hacker Guccifer recently breached the personal e-mail of Roy Apseloff, who recently retired as Vice President for Information Management and Deputy CIO at the U.S. Defense I...
The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched....
SAN FRANCISCO: In 2001 the FBI discovered that one of its own agents had been spying for foreign intelligence services for 22 years. The shock of the Robert Hanssen case led the FBI to build and evo...
The IT security community is a fluid one, with professionals changing jobs and adjusting to a continuously evolving threat landscape. Aaron Portnoy, a well-known and respected figure who until recen...
Whether you’re operating a global enterprise network or a small family business, your network’s security needs to be optimized with tools, teams, and processes to protect customer data and valuable b...