In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw, according to a new report from HP Fortify.
Stories by Maria Korolov
The automated security incident response space is still in its infancy, but several companies are working on the problem of collecting all the security alert data, analyzing it, and triggering automatic remediation processes when appropriate.
If you still haven't seen the new movie Michael Mann movie, Blackhat, with Chris Hemsworth playing the lead, you won't be getting any new insights into how hackers work.
We'll be seeing more severe vulnerabilities like Shellshock and Heartbleed in 2015, predicts Akamai Technologies Inc., the leading content delivery network. The use of cheap online hacking toolkits will continue to proliferate, as will politically motivated attacks such as those during last year's World Cup.
According to the Open Security Foundation, three out of 10 of the all-time worst security breaches happened this year. That includes 173 million records from the NYC Taxi & Limousine Commission, 145 million records at Ebay, and 104 million records from the Korea Credit Bureau. And that's not counting the 1.2 billion user names and passwords reportedly stolen by Russian hackers, or the 220 million records recently discovered stolen from gaming sites in South Korea.
Open source software, once just the domain of technology hobbyists, is taking over the software world
Here are 10 types of links you should never click on.
Here’s a list of the 15 Big Data companies to watch.
With the right boss and the right broadband, these tech workers relocated to paradise destinations
Big Data-as-a-Service offers quick, inexpensive, targeted analytics. The information is coming in fast, at high volumes, in a variety of formats. It's too much for human beings to handle – it's a job for big data analytics.
Here are 10 things we love about Ubuntu 13 and 5 things we hate.