Latest Headlines

Latest Headlines

News Scan: NSA spying fallout worse than first thought; Consumers await word on Supervalu breach severity; more.

The top news stories for August 20, 2014.

Spotlight: Wired on the real Edward Snowden story

James Bamford's one-on-one interview with Edward Snowden.

Forrester cuts its IT spending forecast in half; 20% of computers could be malware breeding grounds; More

The top news stories for August 14, 2014.

Why the Blackphone hack at DEF CON was way overhyped

The Blackphone, a smartphone offering encrypted communications (phone calls, browsing, email, text), made headlines at last week's DEF CON conference in Las Vegas. Unfortunately, most of those headlines were inaccurate.

Choosing BYOD vs. CYOD? The path to both is secure data

Whether your organization is embracing a BYOD or a CYOD program, ulitmately what are most important are the steps you take to secure company data. Here are some steps on how to do just that.

Social engineering blunders at security shows

The more hacker-ish the show ethos, the more attention attendees should pay to their own behavior.

Spotlight: NSA surveillance harms US businesses abroad

Revelations about the National Security Agency surveillance programs are hurting U.S. business abroad, says a new report.

Nowhere to run, nowhere to hide for Tor hidden services users

Earlier this month, officials of the Tor anonymous network uncovered an attack campaign that could have unveiled the identities of users of Tor hidden services, which hide a user's IP address.

Can the FTC sue companies over lax IT security?

A federal appeals court has agreed to consider the question of whether the Federal Trade Commission has the authority to sue companies for lax IT security that leads to data breaches.

Wearables are best suited for fast-paced workplaces, says Android developer

Wearables are better suited to a fast-paced workplace than smartphones, argues Jared Banyard, Android developer at Lua.