Hacking

In this section we cover hacking, threats, and related security issues. Also see enterprise security and viruses.




Cyberattacks such as data breaches involve more than just the internal IT department. The aftermaths can involve customers, partners and...

How Cyberattacks Affect Share Holders and Board Members


The exponential explosion in the value of bitcoin and other cryptocurrencies has garnered the attention of investors the world over. It has...

Hacking Activities Increase Along with Cryptocurrency Pricing


A data breach impacting personal identifiable information (PII) can ruin someone's life, but an attack on critical health infrastructure...

The Health Care IT Security Challenge


Despite good intentions, ethical hackers are are sometimes prosecuted for their discoveries. Do they need broader legal protection?

Do Ethical Hackers Need Legal Protection?


Distributed denial of service (DDoS) attacks have plagued businesses and individuals alike for years, but is the end in sight? Blockchain...

Will Blockchain Technology Make DDoS Attacks Obsolete?


It felt like 2017 was a banner year for cybercrime, with headlines about the Equifax data breach and WannaCry ransomware, but in 2018 the...

Cybercrime 2018: The Enterprise Strikes Back


Each and every year, new attacks leave behind a new normal in cybersecurity. So what will that look like in 2017? We asked experts to give...

Experts Share the Top Cybersecurity Trends to Watch for in 2017


Whether it is cyber criminals utilizing ransomware or hackers performing data breaches for extortion, the healthcare industry is now the...

The Growing Cybersecurity War on the Health Care Industry


Discover how pools of investment money, research and development and the creation of vast distribution channels is speeding up the...

The Ability to Combat Ransomware Just Got a Lot Tougher


The battlefield no longer has to be a physical space - war is now taking place in cyberspace. White hat and grey hat hackers combat...

The Cyber War Against Terrorism


As human activity in the physical space evolves and merges into the virtual, ethereal realm of networked media, significant changes are...

When Mobile Goes Global: A New Era in Connectivity


Ransomware can cripple a business, but what can you do about it? Security experts weigh in on options.

How Should Businesses Respond to a Ransomware Attack?


Some new technology isn't living up to expectations, while some is making a comeback. We also look at the newest in navigation and hiring...

Web Roundup: Privacy, Hacking and Emerging Technology


Data breaches can happen to any business, not just the huge nationwide chains you hear about on the news. Small- to medium-sized businesses...

Why Small Businesses Need to Learn from High-Profile Data Breaches


As the holidays approach and shoppers shift into high gear, so do hackers. Protect yourself and your business against data breaches so that...

How Retailers Can Safeguard Against Holiday Hackers


Deleting data doesn't necessarily mean that it's permanently gone. Here are some methods for keeping your private data out of the wrong...

Never Really Gone: How to Protect Deleted Data From Hackers


Malware doesn't just affect computers anymore - it's becoming an ever-increasing threat to Android devices as well. Learn about Android...

Why Android Anti-Malware Apps Are a Good Idea


Android marketplaces are not vetting applications sufficiently. A North Carolina State University research team has a solution that will...

Is This a Potential Cure for Malicious Android Apps?


CryptoLocker began crippling computers in late 2013. Now the new and improved PowerLocker has been discovered, and is even more dangerous...