May 3, 2016 Maker of controversial Yik Yak app responds to critics Yik Yak, an anonymous location-based social media app, has gained traction as a fast rising startup. But with that success has come criticism. Yik Yak has come under fire as critics claim the anonymity of the app facilitates cyber bullying.
May 3, 2016 6 amazing business travel gadgets Heading out on a business trip? These gadgets can help. They are designed to provide that extra edge you need to stay focused, charge up your devices, keep tabs on your email, and even protect your data from hackers.
May 3, 2016 Protecting the Internet of Things If you think PCs are vulnerable to hackers and digital eavesdroppers, imagine a home filled with tiny computers embedded in everything from door locks to refrigerators.
May 3, 2016 ISIS supporters may operate over 46,000 Twitter accounts, study says As the social media battle with Islamic State escalates, a report from the Brookings Institution warns that ISIS supporters may be operating more than 46,000 Twitter accounts.
May 3, 2016 Mandarin Oriental probes credit card breach The Mandarin Oriental Hotel Group is the latest organization to fall victim to cyberattackers, confirming that credit card systems at some of its hotels in the U.S. and Europe have been breached.
May 3, 2016 Bitcoin robberies hit New York Bitcoin might make money transactions easier in the digital age, but it’s also brought about another way for people to get robbed. Dwayne Richards, a New York City-based firefighter, was the most recent victim of a bitcoin robbery, reports the New York Business Journal. Richards was stabbed by the thieves he was in contact with for a bitcoin-for-cash exchange in Williamsburg, Brooklyn.
May 3, 2016 Could the NSA turn your hard drive into a cyber spy? Security researchers at Kaspersky Lab have unearthed malware that can place spying software in hard drives, fuelling suspicion that the National Security Agency may be behind a new breed of cyber espionage technology.
May 3, 2016 Hacking connected cars: How scared should you be? Does playing Pandora through your dashboard put you at risk of being driven off the highway by malicious hackers? It might, according to work by computer researchers and a survey published this week by Sen. Edward Markey, D-Mass.
May 3, 2016 Why is the US Army opening the door of its cyber arsenal? The U.S. Army has taken the unprecedented decision to release source code from in its cyber arsenal, specifically a version of the Dshell forensic analysis code.
May 3, 2016 Military spouses targeted in twisted ‘CyberCaliphate’ hack Military spouses are the latest target of the hacking group describing itself as “CyberCaliphate,” which claims affiliation to the Islamic State.