ALERT

Stop Ransomware Mid-Flight

Hacking

In this section we cover hacking, threats, and related security issues. Also see enterprise security and viruses.




Techopedia Deals is offering up cyber security and hacking certification this Cyber

Cyber Monday: 25% Off All Cyber Security & Computer Hacker Professional Certification Package


Give the gift of knowledge or treat yourself with these courses on machine learning, web development and ethical hacking

Black Friday Roundup: The Complete Machine Learning Bundle, The Complete Web Developer Course 2.0, Become an Ethical Hacker Bonus Bundle


Techopedia Deals is now offering the ultimate products for those who want to be empowered with cutting-edge skills and knowledge in modern...

Techopedia Deals: Big Data and Analytics Master Toolkit, Windscribe VPN, White Hat Hacker 2017 Bundle


Whether it is cyber criminals utilizing ransomware or hackers performing data breaches for extortion, the healthcare industry is now the...

The Growing Cybersecurity War on the Health Care Industry


Discover how pools of investment money, research and development and the creation of vast distribution channels is speeding up the...

The Ability to Combat Ransomware Just Got a Lot Tougher


The battlefield no longer has to be a physical space - war is now taking place in cyberspace. White hat and grey hat hackers combat...

The Cyber War Against Terrorism


As human activity in the physical space evolves and merges into the virtual, ethereal realm of networked media, significant changes are...

When Mobile Goes Global: A New Era in Connectivity


Ransomware can cripple a business, but what can you do about it? Security experts weigh in on options

How Should Businesses Respond to a Ransomware Attack?


Some new technology isn't living up to expectations, while some is making a comeback. We also look at the newest in navigation and hiring...

Web Roundup: Privacy, Hacking and Emerging Technology


Data breaches can happen to any business, not just the huge nationwide chains you hear about on the news. Small- to medium-sized businesses...

Why Small Businesses Need to Learn from High-Profile Data Breaches


As the holidays approach and shoppers shift into high gear, so do hackers. Protect yourself and your business against data breaches so that...

How Retailers Can Safeguard Against Holiday Hackers


Deleting data doesn't necessarily mean that it's permanently gone. Here are some methods for keeping your private data out of the wrong...

Never Really Gone: How to Protect Deleted Data From Hackers


Malware doesn't just affect computers anymore - it's becoming an ever-increasing threat to Android devices as well. Learn about Android...

Why Android Anti-Malware Apps Are a Good Idea


Android marketplaces are not vetting applications sufficiently. A North Carolina State University research team has a solution that will...

Is This a Potential Cure for Malicious Android Apps?


CryptoLocker began crippling computers in late 2013. Now the new and improved PowerLocker has been discovered, and is even more dangerous...

PowerLocker: How Hackers Can Hold Your Files for Ransom


As cyber threats continue to evolve, old security solutions just don't cut it. Here are a few technologies that have been rendered minor...

3 Defenses Against Cyberattack That No Longer Work


This Trojan Horse keystroke logger is believed to be a special FBI surveillance program that can be installed remotely via an email...

INFOGRAPHIC: Is FBI's Magic Lantern the Ultimate Keylogger?


As Twitter becomes an increasingly important source of information, hackers are turning it into a playground. Check out some of the biggest...

Top 4 Most Devastating Twitter Feed Hacks


Click fraud may be a virtual crime, but its effects are becoming increasingly real for consumers and businesses