
What You Need to Know About the Community Health Systems Breach
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
541 articles
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Unpatched flaws in Android make your device vulnerable to “Invisible” infection. You better find out now in order to protect yourself.
Losing your work or personal data is a computing worst case scenario. While there is no shortage of ways you can lose your data, there are also a number of protections that can help.
Yahoo plans to implement end-to-end encryption for all of its mail users, giving normal, non-technical users the power to communicate securely and privately.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
Most free apps are not actually free. They monetize on displaying ads to you ― and sometimes it is very annoying.
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
The first summer month brought us news about the eternal confrontation of law enforcements and cybercriminals. Let’s see who was busted in June.
June was a busy month with hacks and data breaches, privacy, cryptography, and mobile security news, and an update on OpenSSL Heartbleed.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?
This week: the first ever Android encryptor malware, a serious Tweetdeck vulnerability arises and is fixed just as quickly, and much more.
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
There was a lot of interesting news about hackers and other cybercriminals, so let’s see who has been busted in May.
Feds take down the Gameover botnet, there’s more trouble for OpenSSL, Google publishes data on global Gmail encryption, and Edward Snowden’s first NSA revelation came out one year ago.
Data breaches seemed to dominate the security news in May, but mobile ransomware emerged as well and there was good and bad privacy news from the tech giants.
Teaching your child the essential codes of conduct on the Internet is as important as teaching them road safety.
A brief video tutorial on how to enable a number of important security and privacy features built into Google’s Gmail service.
Device loss remains among the most serious cyber-threats to consumers. Here are a few tips to avoid losing your favorite gadgets.