Get in Touch
The Hidden Cost of Verizon’s ‘Free’ Rewards Program
With the announcement of Verizon Up, a new wireless rewards program that provides users with customer incentives, first-dibs opportunities on things like VIP tickets...
3 New Ways That Criminals Are Making Money Off Your Stolen...
The treasure trove of stolen personal information which grows exponentially year after year on the Dark Web is attracting cyber criminals like ants to a picnic.
Thousands of commercial, government and...
The Apps Your Partner Could Be Using to Spy on You
“These apps are brutal,” Ondrej Krehel told me during a conversation about spyware, or “spouseware” as the software is sometimes called.
“It doesn’t matter what...
How Tragedy & Identity Thieves Kept One Woman From a Near-Perfect...
Identity theft can deal serious damage to your finances. And repairing its effects can be stressful and time-consuming, especially when it comes to repairing the...
As Data Multiplies, Technology Helps Tackle More Challenging Security Issues
IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation.
For years,...
Is Your Gym Exposing More Than Your Abs?
When Apple announced a serious hardware flaw last week, and the critical security patch that addressed it, my first thought was perhaps arbitrary: “That...
Security of Medical Devices Needs Intensive Care
Medical devices, such as such as pacemakers, insulin pumps and defibrillators, could become lethal in the hands of a hacker tampering with them remotely.
A new study...
Want to Avoid a Data Breach? Start By Taking a Close...
It has been almost four years since the massive Target data breach. Astoundingly, managing third-party risks still does not command the vigilance it should in all too many organizations.
The...
Want to protect your small or midsize business from a breach?...
As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small-l and medium-size business owners. The growing popularity is...
As use of IoT devices explodes, detecting vulnerabilities becomes nascent industry
The number of machine-to-machine connected devices—the Internet of Things—is growing faster than the world population. Cisco estimates that M2M connections will grow from 4.9 billion in...