Hacking

News and Articles About Hacking

3 Reasons Why You Should Install Your Own Private Cloud
Cybersecurity

3 Reasons Why You Should Install Your Own Private Cloud

This tech tool puts cloud computing under your control.
Before You Use the Public Wi-Fi, Read This
Cybersecurity

Before You Use the Public Wi-Fi, Read This

Is public Wi-Fi safe? Hell, no. But there are steps you can take.
The Frightening Potential of Hackers Disrupting the Ballot
Election 2016

The Frightening Potential of Hackers Disrupting the Ballot

The cybersecurity worries of private business pale compared to the potential of hackers undermining trust in an accurate vote count.
Chris Wysopal
How Last Week's Internet Slowdown Proves How the Internet of Things Industry Failed Us
Internet of Things

How Last Week's Internet Slowdown Proves How the Internet of Things Industry Failed Us

The most frustrating part of the recent DDoS attack is that there were plenty of warning signs.
Pokémon Go Has Exposed Hacker Subculture and a Personal Moral Dilemma
Marketing Bootcamp

Pokémon Go Has Exposed Hacker Subculture and a Personal Moral Dilemma

The charm of Pokemon Go is that you wander searching in the real world, except hackers have already figured out how to search without leaving home. Is that cheating?
Peter Gasca
4 Foolish Cybersecurity Mistakes Robert Herjavec Is Shocked People Still Make
Shark Tank

4 Foolish Cybersecurity Mistakes Robert Herjavec Is Shocked People Still Make

'You're really not that sexy, there isn't a woman in Russia who wants to meet you and you didn't win a million dollars,' he says, so you'd better hold that click.
Kim Lachance Shandrow
Twitter CEO Jack Dorsey's Account Was Compromised By Hackers
Cybersecurity

Twitter CEO Jack Dorsey's Account Was Compromised By Hackers

'OurMine' previously hijacked the accounts of Google CEO Sundar Pichai and Mark Zuckerberg.
Battling Cyber Threats Begins With Employee Education
Cybersecurity

Battling Cyber Threats Begins With Employee Education

Even the best of software and technology is useless without appropriate human training.
Kelly Ricker
Cybersecurity

The Security Threats Small Businesses Must Keep Their Eyes On

To ensure small-business owners are equipped with the tools and resources needed to stay protected, we asked a number of experts what security threats SMBs face and how to remain safe.
Andrea Huspeni
House Blocks Google-Hosted Apps, Yahoo Mail Over Security Fears
Cybersecurity

House Blocks Google-Hosted Apps, Yahoo Mail Over Security Fears

The two restrictions have both been implemented within the past two weeks and are still in place.
Have a Burning Business Question? Ask Our Security Expert: Gary Davis.
Ask the Expert

Have a Burning Business Question? Ask Our Security Expert: Gary Davis.

As Intel's chief consumer security evangelist, Gary Davis is looking to take your questions about security, including privacy, breaches, protecting your data, Internet of Things and managing threats.
Andrea Huspeni
How These Mormon Women Became Some of the Best Cybersecurity Hackers in the U.S.
Cybersecurity

How These Mormon Women Became Some of the Best Cybersecurity Hackers in the U.S.

The Brigham Young University team took second place in its first year competing at the National Collegiate Cyber Defense Championship.
Ashley Madison Plaintiffs Can't Anonymously Sue Over Hack, Court Says
Ashley Madison

Ashley Madison Plaintiffs Can't Anonymously Sue Over Hack, Court Says

Judge John A. Ross, of a district court in Missouri, wrote in his ruling that being publicly named as an Ashley Madison user amounts to more than common embarrassment, but noted the 42 plaintiffs have special roles in the case that require identification.
Ready, Set, Hack: Pentagon Invites Hackers to Break Into its Computer Systems
Hackers

Ready, Set, Hack: Pentagon Invites Hackers to Break Into its Computer Systems

The public bug bounty program is the government's first.
Catherine Clifford