security

security - News, Features, and Slideshows

Features

  • 4 big plans to fix internet security

    Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom

  • ​Spying smart toys – How to protect your kids from exposure online

    In today’s day and age we see a huge amount of excitement around finding the biggest and best presents for kids. Not only this, children are encouraged to surf the web and use mobile apps from a young age. We are seeing toddlers trading toy cars and stuffed animals for tablets and mobile devices. Children are so attracted to having games and electronic devices to play with, they unwittingly give over their personal details without a second thought. Children are now so au fait with technology that it’s not unusual for children under the age of 4 to play with their tablets, mobile devices and watching TV right before bed.

  • BYOD is as entrenched (and complicated) as ever

    The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.

  • Ashley Madison -- Can it possibly get any worse? (tl;dr: YES)

    The Ashley Madison hack continues to make headlines. Naturally, that's because the news keeps getting worse. Worse for website owners Avid Media Group. And worse for the REAL victims, more importantly -- the people named in the hacked data dump...

  • At what point do white hat hackers cross the ethical line?

    In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts' side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing a live "pen-test" of a plane network in mid-air.

  • Network analysis is like turning over rocks

    I just found out my company's employees have been finding ways to get around my Web filtering. And that came as a surprise, because I use a best-in-class product that employs a database to categorize and block website URLs, which I thought I could rely on. But as I found out, that product is not perfect.

  • MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks

    After the Office of Personnel Management breach, medical data was labeled as the "<a href="http://www.reuters.com/article/2015/06/05/cybersecurity-usa-targets-idUSL3N0YR30R20150605">holy grail</a>" for cybercriminals intent on espionage. "Medical information can be worth 10 times as much as a credit card number," reported Reuters. And now to steal such information, hospital networks are getting pwned by malware-infected medical devices.

  • The science behind alert fatigue: How to turn down the noise so you can hear the signal

    You've likely experienced <a href="http://www.healthcareitnews.com/directory/alert-fatigue">alert fatigue</a> at some point in your life. You feel exasperated as your phone pings for what seems like the hundredth time in a day, or your eyes glaze over as a glut of new analytics data rolls in. You feel resigned to the fact that an influx of email could very well go on forever.

Market Place