From Chihuahuas to Ninja Climbing Claws: The 5 Wackiest Items Confiscated by TSA in 2015
The Transportation Security Administration says it had a busy year in 2015.
Despite Social Media's Popularity, Most Americans Don't Want to Give Up Private Data
Clearly, the latest report from Pew shows we're conflicted, because we're still all on Facebook.
Create a Back-Up Plan for Your Data
Don't wait until Armageddon strikes.
The Biggest Cybersecurity Threat at Your Office Could Be You (Infographic)
Companies lost between $375 and $575 billion last year on hack attacks, according to cybersecurity firm Digital Guardian.
Soon, Your Driver's License May Not Be Enough to Get You on a Domestic Flight
You may have to bring extra documentation to the airport depending on how your state is complying with new security standards.
Meet the Bomb-Proof 'Fly-Bag' That Could Suppress an Explosion on an Airplane
The technology shows how a plane's luggage hold may be able to contain the force of a bomb.
Children's Photos Among Data Stolen in Hack of Toy Maker VTech
A vigilante hacker's breach of 5 million accounts for the Hong Kong-based Internet-connected toy maker brings parents' worst nightmares into reality.
Kim Lachance Shandrow
EU Cracks Down On Bitcoin, Anonymous Payments Systems to Curb Terrorism Funding
EU interior and justice ministers will gather in Brussels on Friday for a crisis meeting in the wake of the Paris attacks.
4 Types of Mobile Monsters and What We Can Learn From Their Horror Stories
System bugs wreaked havoc on mobile devices in 2015, but they could have been prevented.
How an 11-Year-Old Entrepreneur Is Helping People Create Safer Passwords
Sixth-grader Mira Modi is on a roll peddling Diceware passwords, and she says it's 'so much better' than being popular in school.
Kim Lachance Shandrow
5 Ways Your Employees Are Unintentionally Sabotaging Your Data Security
Your employees, even the ones that only have your company's best interest at heart, may unintentionally be making a series of critical mistakes that could put your data security at great risk.
Know Thy Enemy. Hire a Hacker to Enhance Your Cybersecurity.
Don't become a victim of a high-profile hack that could destroy your business for good.
Effective Background Checks: 5 Factors to Consider
Sometimes a potential employee isn't all he or she seems to be. Proper screening is a must.
Paper Documents Are Potential Data Breaches Too
Crucial signed documents need special consideration in your overall security program.
Starting a Business
Reprints & Licensing
© 2016 Entrepreneur Media, Inc.
This ad will close in