Security

This Tech Startup Wants to Revolutionize Your Home
Technology

This Tech Startup Wants to Revolutionize Your Home

Vivint's new 'Sky' system learns how you interact with your home to make it a smarter place. It's not just automation, but smart automation.
Why the TSA Now Wants You to Turn On Your Cell Phone Before Boarding
Technology

Why the TSA Now Wants You to Turn On Your Cell Phone Before Boarding

'Powerless devices will not be permitted onboard the aircraft,' the TSA said, in order to thwart bombs potentially concealed within handheld gadgets.
Cyber Insurance: The Next Big Thing for Businesses
Technology

Cyber Insurance: The Next Big Thing for Businesses

A growing number of small businesses are buying up cyber insurance to protect themselves in the event of a cyber attack.
Supreme Court Unanimously Rules Police Can't Search Smartphones Without a Warrant
Technology

Supreme Court Unanimously Rules Police Can't Search Smartphones Without a Warrant

'The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which [America's] founders fought.'
Google-Owned Nest Buys Dropcam, a Home-Monitoring Startup, for $555 Million
Technology

Google-Owned Nest Buys Dropcam, a Home-Monitoring Startup, for $555 Million

The deal signals that the connected home industry is rife with potential and gaining tremendous steam.
Why Security Should Be Top of Mind When Creating a Business
Starting a Business

Why Security Should Be Top of Mind When Creating a Business

Because startup founders can be slow to install safeguards against cyber attacks, criminals often target new companies.
PF Chang's Confirms Credit-Card Breach
Business News

PF Chang's Confirms Credit-Card Breach

The restaurant chain has moved to a manual credit-card imprinting system in the wake of a security breach.
Facebook Lets Users Determine the Ads They Want to See
Technology

Facebook Lets Users Determine the Ads They Want to See

The social giant is letting users modify their ad profiles while also gaining more information about them.
Twitter's TweetDeck Returns After Security Issue Derailment
Technology

Twitter's TweetDeck Returns After Security Issue Derailment

Popular social-media tool gets hit by hackers sending strange messages.
 5 Steps to Keeping Your Private Communications Secure
Technology

5 Steps to Keeping Your Private Communications Secure

Control where your company emails go, how long they're seen and retrieve them when necessary -- even after you hit send.
Oklahoma Company Creates Bulletproof Blanket to Protect Kids During School Shootings
The 'Treps

Oklahoma Company Creates Bulletproof Blanket to Protect Kids During School Shootings

The backpack-like bulletproof shield may represent one of the most tragically apropos inventions of our time.
New iOS 8 Feature Can Help You Find a Lost iPhone, Is Also Kind of Creepy
Technology

New iOS 8 Feature Can Help You Find a Lost iPhone, Is Also Kind of Creepy

Lost your phone? Bummer. But Apple has one more way for you to locate it.
Why Your Credit Card Company Wants to Replace Magnetic Strips With Microchips
Technology

Why Your Credit Card Company Wants to Replace Magnetic Strips With Microchips

Magnetic strip credit cards will soon be extinct in the U.S. Here's the technology that will replace them and what you need to know about it.
Here's Why You Need to Change Your eBay Password Right Now
Technology

Here's Why You Need to Change Your eBay Password Right Now

The world's biggest online marketplace has been hacked. Those weird warning messages weren't a false alarm.
U.S. Charges Chinese Officials With Economic Espionage
Business News

U.S. Charges Chinese Officials With Economic Espionage

The indictment marks the first time that the U.S. government has brought charges against foreign officials for cyber spying.
The Crazy Things Your Future Credit Cards Will Do (Infographic)
Technology

The Crazy Things Your Future Credit Cards Will Do (Infographic)

Tomorrow's credit cards will be replete with high-tech security features like fingerprint unlock, voice control and invisibility, according to this infographic by Richard Branson's Virgin Money.
8 Ways to Protect Yourself From Microsoft's Dangerous Internet Explorer Bug
Technology

8 Ways to Protect Yourself From Microsoft's Dangerous Internet Explorer Bug

Take these quick, easy steps to fend off hackers taking advantage of a serious flaw in the popular web browser.
 Keep This In Mind When Buying Your Next Smartphone
Technology

Keep This In Mind When Buying Your Next Smartphone

Tech enthusiast Veronica Belmont says this feature is too important not to consider when picking the smartphone that's right for you.
Think Samsung's Fingerprint Scanner Is Foolproof? Think Again.
Technology

Think Samsung's Fingerprint Scanner Is Foolproof? Think Again.

The security feature on Samsung’s new Galaxy S5 was tricked. Here's how.
Entrepreneurs Need to Get Serious About Security -- Now
Technology

Entrepreneurs Need to Get Serious About Security -- Now

In this video, tech expert Veronica Belmont discusses the one thing business owners need to do better when it comes to technology.
Crafts Chain Michaels Confirms Nearly 3 Million Credit Cards Compromised in Data Breach
Business News

Crafts Chain Michaels Confirms Nearly 3 Million Credit Cards Compromised in Data Breach

A security hole allowed data thieves access to some customer card information but not names, addresses or PINs.
The Smartphone 'Kill Switch' Is Coming, But You'll Probably Have to Download It
Technology

The Smartphone 'Kill Switch' Is Coming, But You'll Probably Have to Download It

Major manufacturers and wireless carriers have agreed to offer a free opt-in 'kill switch' for smartphones made after July 2015.
How to Create Super-Strong Passwords to Protect Yourself From the 'Heartbleed' Security Bug
Technology

How to Create Super-Strong Passwords to Protect Yourself From the 'Heartbleed' Security Bug

This online security hole could affect a sizable portion of the 'secure' web. Here's what you can do to stay safe.
The Threat Lurking in Bringing Your Own Device to Work
Technology

The Threat Lurking in Bringing Your Own Device to Work

With the versatility offered by mobile devices comes the risk of cyber theft. Here are five strategies for employers to reduce their exposure.
How to Diversify Your Company and Tackle New Industries
Grow Your Business

How to Diversify Your Company and Tackle New Industries

Offering related services can bring your firm new customers and added revenue. Here are four tips for making it all happen.
It's D-Day for Windows XP. Here's What Users Need to Do Right Now.
Technology

It's D-Day for Windows XP. Here's What Users Need to Do Right Now.

If your computer still runs on Windows XP, you're about to become an easier target for cyber thieves.
Ads by Google

Connect with Entrepreneur

Ads by Google