Security Resource Center

8 Ways to Build a Better Password
Technology

8 Ways to Build a Better Password

Put down the Post-it. I repeat: put down the Post-it.
5 Employee Types You Should Recognize to Enhance Your IT Security Policies
Technology

5 Employee Types You Should Recognize to Enhance Your IT Security Policies

From "Mr. Feet on the Ground" to "Ms. Head in the Cloud," these employee personalities help you find the holes in your system.
Social Coding Site GitHub Hit by Days-Long Cyber Attack
Technology

Social Coding Site GitHub Hit by Days-Long Cyber Attack

China is reportedly the source of the attack.
How Much Do Data Breaches Cost Big Companies? Shockingly Little.
Technology

How Much Do Data Breaches Cost Big Companies? Shockingly Little.

From Sony to Target, big companies that were hacked felt barely a dent to their bottom line, an analysis reveals.
Hackers May Be Able to Secretly Download Malicious Apps onto Nearly Half of All Android Phones
Technology

Hackers May Be Able to Secretly Download Malicious Apps onto Nearly Half of All Android Phones

The 'Android installer hijacking vulnerability' reportedly allows attackers to surreptitiously download apps to Android users without them knowing.
Crowdfunded Smart Home Device Canary Lands at Big-Name Stores
Technology

Crowdfunded Smart Home Device Canary Lands at Big-Name Stores

Canary has officially completed the journey from crowdfunding platform to mainstream retailers.
U.S. Urges Companies to Do More to Fight Cyber Crime
Technology

U.S. Urges Companies to Do More to Fight Cyber Crime

Cyber crime is probably the biggest risk facing companies across the world, officials say.
Do This to Prevent Cybercrime and Save Your Business from Disaster
Technology

Do This to Prevent Cybercrime and Save Your Business from Disaster

Cyber attacks are not a matter of "if" but "when."
Avoiding the
Technology

Avoiding the 'Inevitable' Breach: 4 Ways Retailers Should Amp Up Security

There's ample advice out there telling chief information officers how to build a breach recovery plan, but the key steps to avoiding such an event are not as clear.
Target to Pay $10 Million to Settle Data Breach Lawsuit
Technology

Target to Pay $10 Million to Settle Data Breach Lawsuit

Individual victims can receive up to $10,000 in damages.
Encryption on iPhones, Facebook Apparently
Technology

Encryption on iPhones, Facebook Apparently 'Petrified' the NSA

Stronger encryption has made it significantly more difficult for the U.S. government to spy on communications.
Worried About Insider Data Theft? This Startup Has You Covered.
Technology

Worried About Insider Data Theft? This Startup Has You Covered.

Analytics software from Canadian startup Interset identifies activity that deviates from "good" behavior and proactively alerts managers.
Microsoft to Offer Biometric Sign-In for Windows 10
Technology

Microsoft to Offer Biometric Sign-In for Windows 10

It will be the first time the company has offered such a service widely across devices.
Alibaba
Grow Your Business

Alibaba's Latest Payments Innovation: Selfie-Powered Transactions

The ecommerce giant is taking another step into the world of mobile payments – this time, using the selfie as an authentication tool.
Facebook Announces New Policies Regarding Names, Nudity and Controversial Content
Business News

Facebook Announces New Policies Regarding Names, Nudity and Controversial Content

Regulating shares among its 1.4 billion users across the world can be a slippery slope, the social network said.
BlackBerry Launches New, High-Security Tablet
Technology

BlackBerry Launches New, High-Security Tablet

It was developed with IBM and Samsung.
Majority of Global Merchants Fall Short on Card Data Security Compliance
Technology

Majority of Global Merchants Fall Short on Card Data Security Compliance

As much as 80 percent failed interim tests, a new report says.
Latest Android Update Puts Emphasis on Security
Grow Your Business

Latest Android Update Puts Emphasis on Security

If your Android phone gets stolen, a new feature makes sure it stays locked until it gets back in your hands.
CIA Sought to Hack Apple iPhones for Nearly a Decade
Technology

CIA Sought to Hack Apple iPhones for Nearly a Decade

Top-secret documents suggest U.S. government researchers created a version of Apple's application development tool to create surveillance backdoors into programs distributed on the App Store.
Microsoft Warns Windows PCs Also Vulnerable to
Technology

Microsoft Warns Windows PCs Also Vulnerable to 'Freak' Attacks

Hundreds of millions of Windows PC users are vulnerable to attacks exploiting the recently uncovered security vulnerability, Microsoft says.

Connect with Entrepreneur

Most Shared Stories