Subscribe: Forbes.com: Security
http://www.forbes.com/security/index.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
apple  browser  cia  companies  cybersecurity  data  digital  history  home security  home  new  online  people  privacy  protect  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Forbes.com: Security

Forbes - Security



Forbes - Security



Copyright: Copyright 2017 Forbes LLC
 



Congress Kills Internet Privacy Protections, Expanding The Market For Your Personal Info

Wed, 29 Mar 2017 06:03:00 -0400

Under the Obama administration, telecommunications companies were not allowed to collect and sell browser history or other data from smart phones. House Republicans voted Tuesday to reversed those regulations, freeing telecoms to sell your personal data at will. Cartoon by Ted Rall.


Media Files:
https://specials-images.forbesimg.com/imageserve/58daefe2a7ea437ada25a4fa/0x600.jpg?fit=scale




This Isn't Your Grandma's Rotary Phone! 39 Cartoons On How Technology Changed Literally EverythingThis way to the tech toons ...How Wikipedia Is Making Kids Dumber Than EverYes. But Would A Car Want To Drive Itself?Smartphones Are The New Heroin For TeensIf 1930s Germany Had TwitterThe No. 1 Reason We Spread Fake News (Even When We Know It's Fake)Worried the CIA Hacked Your Smart TV? Here's What They Know About You Now#NetflixAndChill ... 5 Years LaterThe No. 1 Reason Nobody Understands Virtual RealityThe One Sure Way To Get Your Kickstarter CrowdfundedUber, But For CatsThe Government Can't Take What You Give Away For Free'Smart Clothes' Will Improve And/Or Ruin Your LifeThe No. 1 Quality Future Employers Want In A Job CandidateFinally! An 'American Ninja' Competition For The Netflix Warrior In Us AllHow To Reboot Your Child For The Digital AgeBig Brother Is Watching You ... From Your ToasterVictimized By An Airbnb Racist? Good Luck With That ...'Pokémon GO': Expand Your World, Meet New People, Get Robbed By ThemNever Too Young To Learn Password Protection!Samsung's New Galaxy Note 7 Is The BombHappy Anniversary Apple! Here's To 10 More Years Of iPhone-Related DistractionAs Robots Are Able To Do More Jobs, What's Left For Humans?Driverless Cars Are Missing A Human TouchMating Rituals Of Silicon ValleyCatfishing: Another Concern Of Video Job InterviewsHarriet Tubman $20 Bill In The Era Of Apple Pay'Observing And Recording' The Cops Comes With LimitationsHow Slack (And Open-Office Design) Is Transforming Workplace CommunicationHow To Answer Dumb Interview Questions (In Silicon Valley)What Do Women Want From Video Games?Keep Calm And Play 'Pokémon GO'How Office Robots May Put Your Job At Risk In Ways You Haven't ImaginedThe Ultimate First World ProblemPrince Fans Pay Tribute By Paying For His MusicHe's A Mac, He's A PC ... And That's The FBIStar Wars' BB-8 Takes The FieldRoger Goodell Isn't Dead, But The NFL Needs A New Twitter PasswordHulk Hogan's Big WinHillary Clinton's Private Email Server Is Still A Thing

Wed, 29 Mar 2017 06:03:00 -0400

Americans love privacy so much, weshare it with everyone. Cartoon byChris Britt.

Back in the day, co-workers used to email each other rather than leaning over the cubicle wall. Times certainly have changed ... or have they?


Media Files:
https://specials-images.forbesimg.com/imageserve/582e1df7a7ea431d601989ba/0x600.jpg?fit=scale&background=000000




8 Major Cyber Attacks Of 2016 [Infographic]

Wed, 29 Mar 2017 06:00:00 -0400

The World Wide Web can be a dangerous place and as technology increases it's only getting worse. The truth is most of us have been hacked at one time or another whether we know it or not. We need to start taking steps to protect ourselves.



If You Don't Know Much About Cybersecurity, You're Not Alone

Wed, 29 Mar 2017 03:09:00 -0400

The Pew Research Center conducted a survey that presents a grim picture what Americans know about personal cybersecurity. The good news is that you can use the survey along with the information presented here to increase your own online safety.


Media Files:
https://blogs-images.forbes.com/kevinmurnane/files/2017/03/cybersecurity-white_640sq-500x500.jpg?width=0&height=600




Here's An Easy Way To Find Out How To Increase Your Security Online

Wed, 29 Mar 2017 03:08:00 -0400

The Pew Research Center's survey on what Americans know about personal cybersecurity is an excellent tool for finding out where your knowledge about internet safety may be lacking. Armed with that insight you can turn your cybersecurity weaknesses into strengths.


Media Files:
https://blogs-images.forbes.com/kevinmurnane/files/2017/03/cybersecurity-black_640sq-500x500.jpg?width=0&height=600




Locker Locks That Thieves Like

Tue, 28 Mar 2017 15:09:00 -0400

Many locks that are used at health clubs and gyms are not secure and are an open invitation to thieves. If you use one of these, then you can be at risk.


Media Files:
https://blogs-images.forbes.com/marcwebertobias/files/2017/03/LOCKER-ROOM-1500.jpg?width=0&height=600




Cybercrime in China: Online Fraud

Tue, 28 Mar 2017 14:58:00 -0400

When it comes to cybercrime in China, outside observers might focus on the hacking of websites or stored data in the U.S. and other Western countries. If a Chinese citizen (particularly an urbanite who grew up in the 1990s/2000s) is asked about cybercrime, the response is likely to be online fraud.



Congress Is Moments Away From Letting ISPs Hawk Your Private Data

Tue, 28 Mar 2017 14:40:00 -0400

The body is set to vote Tuesday on a Senate-approved bill scrapping rules that prohibit the unauthorized use and sale of intimate data—a change which could be permanent.


Media Files:
https://specials-images.forbesimg.com/imageserve/cc162e530442442aa0165d0012618abe/0x600.jpg?fit=scale




Bitcoin: 'Blood Diamonds' Of The Digital Era

Tue, 28 Mar 2017 14:19:00 -0400

Coupled with Bitcoin’s popularity among ransomware extortionists and all manner of other cybercriminals, we must now face a chilling realization: the underlying value of Bitcoin really has little if nothing to do with its artificial scarcity or popularity as a medium of speculation.


Media Files:
https://blogs-images.forbes.com/jasonbloomberg/files/2017/03/bitcoin.jpg?width=0&height=600




The Dell Wyse 3040 Blurs The Lines Between Entry PC And Secure Thin Client

Tue, 28 Mar 2017 13:00:00 -0400

Thin clients don't get a whole lot of attention in the world of iPhones and PC detachables, but the latest improvements in VDI and thin clients like the Dell Wyse 3040 could make a big difference in that.


Media Files:
https://blogs-images.forbes.com/patrickmoorhead/files/2017/03/3040-detail-B_i1_0000-1200x675.jpg?width=0&height=600




State Of The Home Security Market: Interview With SimpliSafe's CEO Chad Laurans

Tue, 28 Mar 2017 11:34:00 -0400

SimpliSafe, founded by Laurans Chad, was one of the first companies to introduce a DIY home security product back in 2006, years before the smart home category really took off. Since then its solutions were installed in more than 300,000 American homes. Chad and I met for a talk about home security:


Media Files:
https://blogs-images.forbes.com/omribarzilay/files/2017/03/Chad_Laurans_simplisafe.jpg?width=0&height=600




New Methods And Regulations Are Still Needed To Protect Against Cyber Crime

Tue, 28 Mar 2017 08:00:00 -0400

New York State has issued guidelines that could help get us closer to a reasonable standard, but we must do even more to stay one step ahead.



Now Is The Time For Marketers To Get Involved In Cybersecurity

Mon, 27 Mar 2017 21:56:00 -0400

As part of a series exploring cybersecurity and its impact on consumers, marketers, and marketing. I talked with Holly Rollo, the CMO of RSA, a Dell Technologies business. The following focuses on marketing's role in cybersecurity.


Media Files:
https://specials-images.forbesimg.com/imageserve/38332441/0x600.jpg?fit=scale




A Great Reason To Update Your iPhone: This Hack Breaks iOS Security With Just A Wi-Fi Connection

Mon, 27 Mar 2017 12:41:00 -0400

Hack could own an iPhone by just having it connect to Wi-Fi, but Apple has fixed it.


Media Files:
https://specials-images.forbesimg.com/imageserve/c5090c0a4ca14b829528c099284069e0/0x600.jpg?fit=scale




New Relic's CIO: Digital Transformation Makes CIO Role More Important

Mon, 27 Mar 2017 09:50:00 -0400

Yvonne Wassenaar has gone from being a partner at Accenture, to IT executive positions at VMware to CIO of digital intelligence platform company, New Relic. Her combination of strong business and technical acumen has also allowed her to join the boards of multiple companies.


Media Files:
https://i.forbesimg.com/http:http://blogs-images.forbes.com/peterhigh/files/2017/03/Yvonne-Wassenaar-Feb17-300x200.jpg




U.K. Calls For Backdoor To WhatsApp After London Attacks

Mon, 27 Mar 2017 07:24:00 -0400

The government’s defense secretarysaid WhatsApp must not be a 'place for terroriststo hide,' putting renewed pressure on Facebook’s most popular messaging service.


Media Files:
https://specials-images.forbesimg.com/imageserve/519417510/0x600.jpg?fit=scale




How CISOs Can Create A Balanced Portfolio Of Cybersecurity Products

Sun, 26 Mar 2017 15:45:00 -0400

This article starts a series on how to build a balanced cybersecurity portfolio. This piece includes the first two steps (Determine Needs, Allocate Spending According to Risk) companies should take when creating that portfolio. Subsequent articles will cover steps three through five.


Media Files:
https://blogs-images.forbes.com/danwoods/files/2017/03/Forbes_How-to-Create-a-Balanced-Portfolio-300x171.jpg?width=0&height=600




UK Home Secretary Demands WhatsApp Backdoor From People Who 'Understand The Necessary Hashtags'

Sun, 26 Mar 2017 14:18:00 -0400

Britain's home secretary, Amber Rudd, has demanded that companies such as WhatsApp should be forced to give the security services a backdoor, saying it's 'completely unacceptable' that terrorists should be able to communicate in secret.


Media Files:
https://specials-images.forbesimg.com/imageserve/648999092/0x600.jpg?fit=scale




The Management Of Cybersecurity: Who Owns It And Manages It?

Sun, 26 Mar 2017 00:01:00 -0400

As part of a series exploring cybersecurity and its impact on consumers, marketers, and marketing. I talked with Holly Rollo, the CMO of RSA, a Dell Technologies business. The following focuses on the “who” related to cybersecurity—who owns it and manages it.


Media Files:
https://specials-images.forbesimg.com/imageserve/596612405/0x600.jpg?fit=scale




Hackers Are Threatening To Wipe Hundreds Of Millions Of iPhones: How To Protect Yourself

Fri, 24 Mar 2017 17:41:00 -0400

Hackers claim they have obtained iCloud and me.com email addresses and passwords and will wipe people's phones unless Apple pays a ransom by April 7. Here's how to protect your data.


Media Files:
https://specials-images.forbesimg.com/imageserve/363466856/0x600.jpg?fit=scale




Eight Vendors Driving Disruption In The IBM Ecosystem

Fri, 24 Mar 2017 14:21:00 -0400

Innovative technologies like IBM Watson are indeed disruptive, but enterprise transformation doesn’t solely depend upon disruptive technology innovations at the expense of older, more established technologies.


Media Files:
https://blogs-images.forbes.com/jasonbloomberg/files/2017/03/interconnect.jpg?width=0&height=600




2 New-and-Easy Home Security Monitors For Inside And Out

Fri, 24 Mar 2017 11:53:00 -0400

These new home security cameras are simple to use. And they work well.


Media Files:
https://blogs-images.forbes.com/scottkramer/files/2017/03/201601007_sensePro-1200x2536.jpg?width=0&height=600




Silicon Valley LiDAR Maker Quanergy Angles For A Trump Border Wall Contract

Fri, 24 Mar 2017 09:00:00 -0400

The company is looking for opportunities to use its vision technology for virtual fences in addition to 3-D imaging for self-driving cars.


Media Files:
https://blogs-images.forbes.com/alanohnsman/files/2017/03/Border-1200x751.jpg?width=0&height=600




My ISP Can Shove My Web Browsing History Up Its Segmented Marketing

Fri, 24 Mar 2017 09:00:00 -0400

The Senate voted to overturn rules that would have made your ISP ask nicely before taking your browsing history. Good thing you already give all your data


Media Files:
https://blogs-images.forbes.com/curtissilver/files/2017/03/vzbae-e1490360384450.jpg?width=0&height=600




10 Incredibly Simple Things You Can Do To Protect Your PrivacyPassword Protect Your DevicesGoogle Yourself RegularlySign Out Of Your Online Accounts When You're Finished Using ThemDon'™t Give Out Your Email, Phone Number, Or Zip Code When AskedEncrypt Your ComputerTurn On 2-step Authentication In GmailPay Cash For Embarrassing ItemsChange Your Facebook Settings To "Friends Only"Clear Your Browser History And Cookies On A Regular Basis

Fri, 24 Mar 2017 09:00:00 -0400

Choosing not to password protect your devices is the digital equivalent of leaving your home or car unlocked. If you're lucky, no one will take advantage of the access. Or maybe the contents will be ravaged and your favorite speakers and/or secrets stolen.

Stay abreast of new things being said or published about you on the Internet. Google Alerts was a formerly wonderful tool for this that no longer works. Now you might try Talkwalker Alerts.

Not only will this slightly reduce the amount of tracking of you as you surf the Web, this prevents someone who later sits down at your computer from loading one of these up and getting snoopy. If you're using someone else's or a public computer, this is especially important. Yes, people actually forget to do this, with terrible outcomes.

Obviously, if a sketchy dude in a bar asks for your phone number, you say no. But when the asker is a uniform-wearing employee at Best Buy, many a consumer hands over their digits when asked. Stores often use this info to help profile you and your purchase. You can say no. If you feel badly about it, just pretend the employee is the sketchy dude in the bar.

Encrypting your computer means that someone has to have your password (or encryption key) in order to peek at its contents should they get access to your hard drive. On a Mac, you just go to your settings, choose "Security and Privacy," go to "FileVault," choose the "Turn on FileVault" option. Boom goes the encryption dynamite. PC folk need to use Bitlocker.

This simple little step turns your phone into a security fob - in order for your Gmail account to be accessed from a new device, a person (hopefully you) needs a code that's sent to your phone. This means that even if someone gets your password somehow, they won't be able to use it to sign into your account from a strange computer. Google says that millions of people use this tool, and that "thousands more enroll each day." Be one of those people.

Don't want a purchase to be easily tracked back to you? You've seen the movies! Use cash. One data mining CEO says this is how he pays for hamburgers and junk food these days.

Visit your Facebook privacy settings. Make sure this "default privacy" setting isn't set to public, and if it's set to "Custom," make sure you know and are comfortable with any "Networks" you're sharing with.

When’s the last time you did that? If you just shrugged, consider changing your browser settings so that this is automatically cleared every session. Go to the “privacy” setting in your Browser’s “Options.” Tell it to “never remember your history.” This will reduce the amount you’re tracked online. Consider a browser add-on like TACO to further reduce tracking of your online behavior.


Media Files:
https://specials-images.forbesimg.com/imageserve/db7b9841db0755d450bbeff739213891/0x600.jpg?fit=scale&background=000000




SAPVoice: Small Businesses Need To Think Big When It Comes To Digital Transformation

Fri, 24 Mar 2017 08:54:00 -0400

While simple technology implementations and near-term results can generate strong results for small businesses, it is possible to be too focused.


Media Files:
https://blogs-images.forbes.com/sap/files/2017/03/shutterstock_559468654.jpg?width=0&height=600




Apple Does Not Negotiate With Wikileaks... For CIA Hack Info

Fri, 24 Mar 2017 05:19:00 -0400

Apple takes a strong line on Wikileaks' demands for CIA exploit disclosure.


Media Files:
https://specials-images.forbesimg.com/imageserve/108474669/0x600.jpg?fit=scale




Fresh Wikileaks Dump Shows CIA Was Hacking iPhones A Year After Launch

Thu, 23 Mar 2017 11:08:00 -0400

CIA docs indicate agency had created malware for iPhones shortly after its release.


Media Files:
https://specials-images.forbesimg.com/imageserve/0de1932d2f9d4f4f9624593b55b6cae8/0x600.jpg?fit=scale




How The Rise Of Nano-Piracy Is Affecting TV Broadcasts

Thu, 23 Mar 2017 09:00:00 -0400

Declining broadcast ratings have more to do with nano-piracy than politics or outside distractions.



Feds Have Found A Way To Search Locked Phones Of 100 Trump Protestors

Thu, 23 Mar 2017 07:25:00 -0400

U.S. has already accessed reams of information from devices seized on Trump's inauguration day.


Media Files:
https://specials-images.forbesimg.com/imageserve/632243426/0x600.jpg?fit=scale