Thousands of hacker attacks were launched on a network of smart home devices designed by researchers to assess the risk the gadgets pose to consumers. During the initial week the "honeypot" network was online, 1,017 unique scans or hacking attempts were directed at the devices on the net, which included smart TVs, printers, wireless security cameras and Wi-Fi kettles...
Does flaky Internet connectivity have you scrounging for solutions? The COVID-19 pandemic increased our demand for Internet service due to working from home, online learning for kids, and video conferencing with colleagues and family members. For many people stuck at home, Internet connectivity issu...
Even though D-Link expressly promised that many of its wireless devices had the highest level of security available, the Federal Trade Commission last month filed a lawsuit that alleges otherwise. The FTC filing includes copies of online marketing materials and technical specifications for D-Link's ...
The U.S. government is on track to significantly boost spending on cybersecurity solutions. However, evolving requirements to greatly improve federal protection of information technology resources will shape that spending. In fact, federal cyberprotection goals should be augmented and significantly ...
Target has disclosed that 40 million customer accounts might have been accessed by hackers between Nov. 27 and Dec. 15. Customer names, credit and debit card numbers, card expiration dates and the three-digit security codes on the backs of cards were compromised when they were swiped through machine...
As Washington hunkers down for an era of tight federal budgets, information technology vendors can take some comfort in a projected modest rate of growth in federal IT investments. Between 2011 and 2016, federal spending for IT should grow by 12 percent, in total, for an average compound annual rate...
In the field of computer technology, some topics are so frequently and fiercely disputed that they almost resemble religious feuds -- Mac vs. PC, for instance, or open source vs. proprietary software. Other topics, though, don't see nearly the same level of high-profile debate. Take the invulnerabil...
The IT security front is like any war: Secure one battle line and a breach may occur on another. Red flags about malware have become almost a daily occurrence in the virtual world, and the malware lexicon has mushroomed in recent years. Terms like "zombie," "rootkit," "worm," "Trojan," "spyware," "b...
I'm an early adopter. I don't just analyze technology from the safety of my own cubicle; I bring it into my home and live with it. I find that by doing so, I gain a perspective that would otherwise be lost. About a year ago, I disconnected my traditional landline phone and signed up for VoIP service...
Like many home keyboard jockeys, I view my wireless network as a black box. I set it up to share my broadband Internet connection. It does that. So I leave well enough alone. That doesn't mean, though, that my curiosity isn't aroused from time to time, and I feel an urge to poke around with the netw...
On all accounts where it's available
Limited to critical accounts like banking and email
Only when enforced by the service provider
Plan to start using soon
Prefer not to use
What is two-factor authentication?
Enter your Username and Password to sign in.