Attacks+data

Showing results 1 to 20 of 122

HAEA's myACT App

The US Hereditary Angioedema Association, Inc. (HAEA), founded and staffed by HAE patients and HAE patient caregivers, is a non-profit...

March 13, 2015 By Eflow Systems LLC

IoT devices not secured by design

Internet of Things devices are not originally built to be robust against attacks, resulting in vulnerabilities that can lead to severe repercussions if left unchecked, such as data that's being collected and acted upon in Singapore's smart nation plan.

March 3, 2015 by

Guide for Killer Instinct (2013)

C-C-C-COMBO BREAKER! The Killer Instinct Guide is the one and only ULTRA way to have all of your KI needs in the palm of your hands...

February 2, 2014 By Andrew Stanton

SharkBytesFree

SharkByteFree is the Ultimate Shark Attack app and so much more!It is a research based app that helps you to research shark attacks...

January 9, 2014 By Eric Knox

Report: Risk of an Uncertain Security Strategy

In spite of high-profile data breaches and the potential business impact of cyber attacks and data loss, small and midsize organizations are still not making cyber security a priority. Sophos and the Ponemon Institute recently released a report, Risk of an Uncertain Security Strategy, that highlights the need to make security a key priority.

December 10, 2013 by

Verizon data breach report: State-sponsored attacks surge

Espionage campaigns seek data that furthers national interests, such as military or classified information, economy-boosting plans, insider information or trade secrets, and technical resources such as source code.

April 22, 2013

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories