Home Page

THE COLONY, TX–Many people vent online, but a Facebook post cost one Texan her job. Kaitlyn Walls was excited to find work; however, she was not as excited about her place of employment, which was a daycare center in Texas. Walls says she’s a single mother and was trying to get out on her own.
Posted: May 4, 2015 12:15 pm
North Korea’s cyberattack on Sony Pictures exposed a new reality: you don’t have to be a superpower to inflict damage on U.S. corporations The following script is from “The Attack on Sony” which aired on April 12, 2015. Steve Kroft is the correspondent. Graham Messick, producer.
Posted: April 19, 2015 11:03 pm
The White House has set out plans to use economic sanctions against cyber attackers and companies that benefit from the online theft of secrets.
Posted: April 1, 2015 4:17 pm
A total of 1,228 popular Android apps found in the Google Play store are still vulnerable to a FREAK attack, FireEye says. Research published on Tuesday by the firm’s security team disclosed just how vulnerable both Android and iOS apps still are to the FREAK bug.
Posted: March 18, 2015 12:33 pm
Like a subgroup of the Internet of Things, connected toys are the new generation of children’s toys – often using Wi-Fi and an iOS or Android-based remote control to manage and manipulate a car, quadcopter, or Lego robot.
Posted: February 27, 2015 2:22 pm
The United States comes up constantly when you talk to Russians about their country’s place in the world. But the conversations tend to go a lot differently than many Americans might expect.
Posted: May 4, 2015 7:54 pm
If you’ve ever wondered what a government has left in its last breath of an argument it’s already lost, it’s almost certainly going to have something to do with “national security.
Posted: April 23, 2015 2:14 pm
In light of the latest global surveillance leaks on Thursday by former U.S. government contractor Edward Snowden, scanners at U.S. airports that catalog you in full birthday-suit glory seem somewhat tame.
Posted: April 6, 2015 12:23 pm
New and subtle business models are emerging for cybercriminals, boosting their sales of stolen data and offering new ways to inflict damage on target organisations. Hackers are commercialising stolen data by selling it back to legitimate businesses, one security expert has warned.
Posted: March 19, 2015 7:37 am
The year of EMV migration is finally upon us, and for small merchants in the US, that means significant changes when it comes to payments.
Posted: March 6, 2015 10:58 pm
In the summer of 2014, Craig Diangelo thought he was on the path to an easy retirement. A veteran of the tech industry, Diangelo got his start as a COBOL programmer in the 1970s.
Posted: April 25, 2017 6:45 pm
TALLINN, Estonia (AP) — About 400 computer experts will participate in a major cybersecurity drill in Estonia this week as part of NATO’s efforts to upgrade its capability to counter potentially debilitating hacker attacks.
Posted: April 24, 2015 11:30 am
More Americans dropped out of the labor force last month, as the number of people not in the labor force hit another record high in March.
Posted: April 6, 2015 1:05 pm
We had been noting, in the wake of the Charlie Hebdo attacks in France, how the country that then held a giant “free speech” rally appeared to be, instead, focusing on cracking down on free speech at every opportunity. And target number one: the internet.
Posted: March 19, 2015 12:17 pm
In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails. In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails.
Posted: March 9, 2015 12:10 pm