The top news stories for March 27, 2015.
In a twist of irony, an initiative by Hilton Hotels & Resorts to prompt members to change the passwords of their account culminated in the discovery of a bug that could allow hackers to take over any number of accounts, if they knew the 9-digit number of a valid account.
It turns out, leaders of companies that offer IT security products and services have different opinions about whether you should care about government hacking.
The top news stories for March 2, 2015.
Looking at what Superfish is, and why the reuse of a self-generated SSL certificate creates a security nightmare for affected computers.
The top news stories for Feb. 17, 2015.
Big data in the form of a massive stash of "anonymized" credit card data poses security and privacy risks, concluded a recent study by the Massachusetts Institute of Technology.
BYOD confronts enterprises with many risks, not the least of which are legal. In an informative article in the Seattle Business magazine, D. Michael Reilly, an attorney with the law firm of Lane Powell, offers enterprises 5 tips on how to manage the legal risks of BYOD.
The top news stories for Jan. 29, 2015.
While the FTC's security and privacy recommendations for IoT devices and data are useful, they are voluntary and therefore lack teeth. Companies have little incentive to spend the extra time and money needed to implement them.