Record-Setting Crowd on Cold, Cloudy Day
Crowds wait in the Washington Mall in anticipation for the swearing-in of President-elect Barack Obama. (Source: Getty Images)Security measures and crowd capacity are expected to be unprecedented as...
View ArticleIdentity Protection Programs: How Do They Stack Up?
You can’t stop identity theft, but you can take measures to protect your personal information. Along with shredding personal documents, regularly checking your credit report for abnormal or...
View ArticleLetting Go
Mary Parker is secure in her team handling some of the work load. (Photo by Darnell Wilburn) When corporate downsizing resulted in a job change from manufacturing supervisor to security guard, Mary...
View ArticleThe Business of National Security
While serving in the United States Air Force, L. Eric Patterson was introduced to the world of intelligence. “It intrigued me,” the 59-year-old says of the work he did with the Air Force Office of...
View ArticleWorkplace Security 101: How to Ensure a Safe Environment
In the aftermath of the recent shooting in Tucson, Arizona that left six people dead and 13 people wounded, including Congresswoman Gabrielle Giffords, security has become a top concern in Congress as...
View ArticleBad Boys, Bad Boys: Out-of-the-Box Law Enforcement Jobs in Demand
(Image: Thinkstock) While many job seekers only consider the well-known careers in policing and security, the law enforcement industry offers a variety of opportunities for those interested in criminal...
View ArticleBoeing Debuts Self-Destructing Android Smartphone
The Android smartphone isn't boasting any high-end specs, but does have a removable panel for modular add-ons. At Mobile World Congress, Boeing unveiled the Boeing Black, its security-oriented Android...
View ArticleUpdate Your iPhone Before Hackers Steal Your Data
The security hole allowed hackers to spy on your unencrypted data ranging from bank information to personal emails. If you’re using an iPhone or Mac running OS X Mavericks, immediately run a software...
View ArticleGeeksphone’s Blackphone Makes Security Simple
At over $600 the Blackphone is a little pricey, but comes bundled with various encryption and security services. While the idea of making a phone “NSA-proof” is a nebulous concept, and while Spanish...
View Article4 Tips to Protect Yourself From the Heartbleed Security Hole
Many sites are still vulnerable to the Heartbleed flaw, so changing your password is highly recommended. There’s a new security flaw making its way around the Internet. It’s called Heartbleed, and some...
View ArticleSamsung Galaxy S5 Already Hacked With Fake Fingerprints
Samsung's latest smartphone has a water-resistant build, heart rate sensor, and a fingerprint scanner. A team of German researchers have figured out a way to dupe the Samsung Galaxy S5′s fingerprint...
View Article19-Year-Old Arrested for Heartbleed Hacking
Stephen Arthuro Solis-Reyes, 19 years old, was charged with unauthorized use of a computer which resulted in the dissemination of Social Insurance Numbers of 900 citizens. It seems like changing your...
View ArticleSony Pictures Involved in Leaked Email Scandal
Sony Pictures suffered a major setback in their public relations department. After internet sleuths hacked the Japanese multinational conglomerate, a slew of embarrassing emails have gone public this...
View Article3 Ways to Separate Work From Personal on Your Mobile Device
Do you use your mobile device for business and personal reasons? If so, you’re not alone. The majority of professionals are working in busy, fast-paced environments and multitasking between personal...
View ArticleDriver’s Licenses May No Longer Get You Through Airport Security
As if traveling wasn’t inconvenient enough! According to a new policy, residents of New York, New Hampshire, Minnesota, and Louisiana may be required to have a passport in order to clear airport...
View ArticleSecure Your Home or Small Business Affordably with Netgear’s Arlo Q
Today, Netgear announced the Arlo Q—a smart camera that offers an affordable way to set up security in a home or small business. Or, it can be used to monitor pets, children, or the elderly, remotely....
View Article#BE30DayChallenge: Week 1, Lock Down Your Social Media
It’s becoming all too familiar: That frantic post from a Facebook friend that reads something along the lines: If you received a friend request from me, do not accept! My account has been hijacked....
View Article#BE30DayChallenge: Secure Your Digital Life
So much of our life is spent online, yet so many of us are not securing our digital life. While there is no such thing as 100% security with any aspect of online activity, many are still not taking the...
View ArticleYour Wi-Fi Router is a Snitch
The Atlantic posted an interesting and somewhat disturbing article on the use of Wi-Fi routers for monitoring people. Scientists are researching ways routers can identify humans by body shape or by...
View Article#BE30DayChallenge, Week 3: Shore Up Your Home Network
Our homes can have as many devices connected to the network as a small business would have about 10 years ago. Laptops, webcams, smart lights, phones, streaming boxes like Roku, gaming consoles, and...
View Article
More Pages to Explore .....