Malvertising – the new silent killer?
Malicious ads on the websites you visit aren’t a new phenomenon. The fact that they now avoid detection and don’t need you to click on ‘em to infect your computer is new, and increasingly troublesome.
Malicious ads on the websites you visit aren’t a new phenomenon. The fact that they now avoid detection and don’t need you to click on ‘em to infect your computer is new, and increasingly troublesome.
A mid-year report shows that people aren’t necessarily getting smarter about security, even in the face of increased attacks from cybercriminals.
We're just a couple months shy of the big EMV liability shift. That's when companies that don't accept chip-enabled debit and credit cards take on financial responsibility for hacks and fraud.
Whenever Apple puts out a new product, it's going to draw headlines. There's no better example than the Apple Watch -- its first offering into the fitness market, which has a potential to be a 22 million unit market in the U.S., according to Market Strategies International.
When a company invests thousands of dollars in security software, you'd expected the product to be used to protect the company.
The mobile health (mMealth) marketplace has lived up to its hype, but where it goes next depends on our changing healthcare needs.
As details filter out about the Home Depot hack (and many, many more data breaches), you can't help but ask: How did this happen -- especially when the company was supposed to adhere to specific safety regulations or else lose its capability to process credit card transactions?
A recent survey from IT staffing firm Modis reaffirms what we all know: The role of CIOs, and the IT department they direct, is changing. Not only do the vast majority of companies view their CIOs as critical members of company structure, they also expect that role to grow in the future.
The beat goes on. In recent weeks, both JP Morgan Chase and Home Depot have been identified as the latest victims of large-scale cyberattacks.
Is that email really from your bank or airline? Or a hacker pretending to be?
IT is out of the backroom and in the front office – so it's time to hire candidates who match that new reality.
Small and medium-sized businesses may think they're immune to the kinds of attacks that wreaked havoc on Target last year, but they're susceptible to the same nefarious forces -- sometimes even more so, as they can lead hackers to a bigger prize.
There are multiple approaches to load testing your website, but one thing is certain: Organizations that fail to see how their sites will handle sudden surges in traffic do so at their own risk.
Camden, N.J. ranks among the United States' most dangerous cities -- and in 2011, its police force was cut in half. However, a state-of-the-art 'tactical information' center, combined with gunshot-spotting cameras, in-cruiser GPS technology and analytics are helping the embattled city cut crime.
Boston-based restaurant chain b.good started its customer loyalty program with email 12 years ago because, well, it couldn't afford much else. As the chain has grown, so has its rewards program, which now has 53,000 'Family' members using keycards and smartphone apps to connect with b.good.