cybersecurity

A new study finds that information stored and emails sent from within the health care industry have the worst security practices  (Photo by Joe Raedle/Getty Images)

Study: Health Care Industry Emails 4X More Likely Fraudulent Than Social Media

A new study finds that information stored and emails sent from within the health care industry have the worst security practices, with such emails being four times as likely to be fraudulent than those from social media outlets such as Facebook.

02/20/2015

Analysts at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, Va., on Sept. 24, 2010. (credit: JIM WATSON/AFP/Getty Images)

Obama to Focus on Cybersecurity Issues Next Week

Continuing the break with State of the Union tradition, President Barack Obama will spend most of next week previewing more of the proposals he will outline in the upcoming address, including on identity theft, electronic privacy and other cyberspace issues, the White House announced Saturday.

01/10/2015

cybersecurity

Experts: Inside Jobs Biggest Cybersecurity Threats To Companies

Security experts warn that insider hacking cost American companies $40 billion in 2013 alone.

01/08/2015

FBI Sony cyber attack impossible to prevent

FBI Says No Way To Stop Sony Hackers

Bureau cybersecurity agent tells a Senate panel the malware used to hack Sony would have gotten past about 90 percent of online defense programs.

12/11/2014

Hackers from China were able to breach government computer systems at the agency that oversees the National Weather Service. (Photo by ROBYN BECK/AFP/Getty Images)

U.S. Confirms Climate Agency Websites Hacked

Hackers from China were able to breach government computer systems at the agency that oversees the National Weather Service.

11/12/2014

Photo Credit Thinkstock

Smart Mouse: Using Your Grip As Your Computer Password

The “Biometric Pressure Grip” is a sensor that measures how hard and how tightly someone holds a mouse, then uses that information as part of a multi-step login process.

10/13/2014

Photo Credit Thinkstock

Education Of A Hacker: One Woman’s Journey

As a “security aide” typist, Jen Havermann got her first exposure to computers while digging through databases.

09/15/2014

(JAY DIRECTO/AFP/Getty Images)

Report: Chinese Cyberattack Group Compromises National Security Think Tanks

Deep Panda has been reading emails of Iraq and Middle East foreign policy experts, says security group.

07/08/2014

Authorities say the crooks hacked into hundreds of thousands of computers around the world and stole more than $100 million. (Getty Images)

U.S. Disrupts Hacking Schemes That Stole Millions

The hackers got into hundreds of thousands of computers around the world, stealing more than $100 million from businesses and consumers.

06/02/2014

Photo credit: PATRICK KOVARIK/AFP/Getty Images

Cybersecurity Company Moves Headquarters To Frederick

A cybersecurity startup company has moved to Frederick, Md., from West Virginia.

04/21/2014

more