Similar Articles |
|
Fast Company Chris Gayomali |
Why Do Companies Keep Getting Hacked? "These days, criminal hacking is a business," Patrick Thomas, a security consultant at Neohapsis, tells Fast Company. "Everything that is done has a chain linked to real dollars. And hackers are looking for the shortest chain." |
Fast Company John Paul Titlow |
After A Hack, Slack Adds Two-Factor Authentication -- Is That Good Enough? The fast-growing enterprise chat startup confirmed today that its database was breached in February and that the intruder had access to the names, email addresses, and encrypted passwords of Slack users. |
PC World September 2004 Andrew Brandt |
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. |
InternetNews April 20, 2010 |
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. |
Fast Company John Paul Titlow |
Google Is Gearing Up To Kill Your Email Password The company is testing a new, multi-device method for letting people log into their accounts without using a password, according to TechCrunch. |
The Motley Fool June 2, 2011 Arunava De |
Amazon Cloud Might Be a Hacker Magnet With the issue of cloud security being brought under question, Amazon has a lot to worry about. |
InternetNews February 22, 2005 Sean Michael Kerner |
Hilton's T-Mobile Hack a Password Wake-Up Along with phone numbers of celebrities in the socialite's Sidekick, the hacking incident exposes the need for strong passwords. |
Wall Street & Technology April 27, 2005 Jim Middlemiss |
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
Inc. November 1, 2009 Michael Fitzgerald |
Are Your Passwords Too Weak? Hacked passwords can compromise company data security. Strategies for creating the best passwords |
InternetNews January 12, 2011 |
Hacker to Expose Wi-Fi Flaw Using Amazon EC2 At next week's Black Hat conference, a security expert reportedly plans to divulge method for breaking wireless networking passwords through brute force attack. |
Search Engine Watch November 18, 2010 Kristine Schachinger |
Why Google Chrome OS & The Cloud May Be Bad Ideas Reconsider the cloud operating systems before you find yourself without any choices and your computer a slave to the powerful companies that now run the technological world we live in. |
PC Magazine June 7, 2011 Mark Hachman |
The Future of iCloud: Video, Premium Services? What's the future of Apple's iCloud? Premium storage options, most likely, possibly followed by home videos. |
PC Magazine January 20, 2009 Matthew D. Sarrel |
Smartphone Security Measures Even the simplest cell phones carry enough data to be dangerous in the wrong hands. |
Fast Company November 2014 Sarah Kessler |
The Hottest Startups Have One Thing In Common: Our Faces You may think of Facebook as a community, a news feed, or even a force for change, but it's really something far simpler: a photography company. |
InternetNews June 6, 2011 Sean Michael Kerner |
Apple Heads to the iCloud Steve Jobs want to move your digital life to the cloud. |
InternetNews December 23, 2004 Brian Livingston |
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. |
Fast Company Glenn Fleishman |
Everything You Know About Passwords Is Wrong Dr. Markus Jakobsson has a very different proposal for a type of password he calls "fastwords," which tie together storytelling, password strength, and probability. |
Fast Company April 2013 Margaret Rhodes |
Foap Helps Sell Photos to Companies -- But Members Get Control And A Cut Two Swedes started an online marketplace for everyday iPhone shooters. Members sell their photos to companies for $10, and Foap takes a 50% cut. |
The Motley Fool July 6, 2010 Anders Bylund |
Apple Gets Hacked Apple wipes egg off its face and makes one Fool think about safer online security standards. |
Technology Research News August 10, 2005 Kimberly Patch |
Plug-in Protects Passwords Researchers have created a browser plug-in, dubbed PwdHash, that produces a different password for each website you visit without requiring the you to remember more than a single password. |
PC Magazine June 6, 2011 Lance Ulanoff |
Apple iCloud Solidifies the Cloud People will remember the day Steve Jobs told them what they were really supposed to do with the cloud. |
CRM June 2015 Leonard Klie |
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information |
PC Magazine August 2, 2011 Sascha Segan |
Apple's iCloud vs. the Data Caps Apple's iCloud joins a crowd of new, high-profile streaming services just as wireless carriers are cracking down on data usage. |
PC World June 2006 Scott Dunn |
Security Is Up to You: Perfect Your Passwords Set up strong password policies for your PC's users... A freeware tool can give you greater control over passwords and more. |
Inc. August 2005 David H. Freedman |
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. |
Fast Company Neal Ungerleider |
How To Sell Your Company To Google In A Year Israeli startup Slicklogin thinks passwords are insecure, messy, and time-consuming. The answer to password woes: soundwaves. The company has only been around for a year or so; they have just been acquired by Google. |
PC Magazine February 8, 2007 Matthew D. Sarrel |
Access Smart Power LogOn Password Manager-USB Card Reader The Access Smart Power LogOn Password Manager bundle will make log-in security relatively pain-free once the interface improves. |
IEEE Spectrum December 2011 Cachin & Schunter |
A Cloud You Can Trust How to ensure that cloud computing's problems - data breaches, leaks, service outages - don't obscure its virtues. |
PC World April 2004 Scott Spanbauer |
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. |
PC World October 2003 Scott Spanbauer |
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. |
Bank Systems & Technology February 18, 2009 Ashfield & Shroyer |
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. |
InternetNews February 2, 2010 |
Twitter Responds to Phishing Attack Twitter's popularity has once again made it the target of the bad guys. |
Popular Mechanics April 2009 Seth Porges |
How to Make Your Webmail Secure Web-mail users need to be especially careful when it comes to their cyber security. Here's how. |
PC World November 7, 2006 Andrew Brandt |
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. |
The Motley Fool June 18, 2011 Anders Bylund |
How to Thwart Digital Thieves and Stay Safe Online You wouldn't give your keys to a stranger on the street, right? Then don't do it online. |
InternetNews September 25, 2007 Larry Barrett |
Hacked iPhones' Days May Be Numbered Apple breaks some bad news to the folks who managed to unlock their iPhones for use on any wireless network. |
InternetNews December 30, 2009 |
Twitter Blacklists 370 Shoddy Passwords To protect its users from themselves, Twitter is preventing new users from selecting some common or easily hacked passwords for their accounts. |
InternetNews August 4, 2005 Jim Wagner |
Cisco Passwords Targeted After discovering a flaw in its internal search tool, the company is resetting the passwords of all its registered members as a precautionary measure. |