AT&T, T-Mobile and Sprint have sold access to subscribers' real-time location data to aggregators, which in turn have sold it to about 250 bounty hunters and related businesses, according to a report. In some cases, the data allowed users to track individuals to their specific locations inside a...

Americans received 26.3 billion robocalls on their mobile phones in 2018, according to Hiya. That was 46 percent more than in 2017. Consumers received an average of 10 spam calls per month, Hiya found. The top unwanted call in the U.S. was for the Wangiri, or "one-ring" scam, which grew 250 percent ...

The personal data of some 100 million people who have used Quora, a popular question and answer website, has been compromised, the company disclosed. "We recently discovered that some user data was compromised as a result of unauthorized access to one of our systems by a malicious third party," wrot...

Several years ago, my wife and I invested in a project called "Sanctuary Belize" and, like many of the investors, we were incredibly excited about the prospect of retiring in paradise. After a time, things just weren't adding up. The company supposedly put controls in place to reverse course, but we...

An increasing number of healthcare professionals have become alert to the need for well-rounded medical device security in recent years, and players throughout the industry have started putting more effort into raising the bar. Developers have become aware of the most glaring holes, and more informa...

Microsoft has torpedoed a pair of websites designed to steal credentials from visitors to two Republican Party think tanks. The malicious websites were among six the company took down last week. A group of hackers affiliated with the Russian military created the sites, according to Microsoft. The gr...

The healthcare cloud has been growing incredibly, becoming an ever-more-important element of health information technology, or HIT. There are many reasons why the HIT cloud has been becoming more prominent, such as research and development and collaboration. Since the cloud has been expanding so rap...

Facebook and Google have manipulated users into sharing data using so-called "dark patterns," according to a report from the Norwegian Consumer Council. The practices nudged users toward accepting privacy options that favored the tech companies rather than themselves, the NCC found. Facebook and Go...

"It's only a few times in the history of the U.S. and in specific domains do you have the opportunity to make decisions and have a lasting effect on that domain," said Circadence VP Keenan Skelly. "In terms of information cybersecurity, we're right in the middle of it right now. We're just figuring ...

Americans have been targeted on social media by Russian agents on a mission to harvest personal information. The agents pretended to work for organizations promoting African-American businesses as a ruse to obtain personal information from black business owners during the 2016 presidential election ...

Given how many big names have fallen over the last few weeks due to sexual misconduct, abuse and harassment, you'd think I'd name 2017 as the year of power abuse. However, while I know a lot of folks think the issue is dying down, I don't see that at all. There are entire industries that have yet to...

ExpressVPN on Tuesday launched a suite of open source tools that let users test for vulnerabilities that can compromise privacy and security in virtual private networks. Released under an open source MIT License, they are the first-ever public tools to allow automated testing for leaks on VPNs, the ...

A popular technique used by website operators to observe the keystrokes, mouse movements and scrolling behavior of visitors on Web pages is fraught with risk. The technique offered by a number of service providers uses scripts to capture the activity of a visitor on a Web page, store it on the provi...

As BlackBerry phones left the market, the company fell out of sight. However, behind the scenes it has been moving into industries like automotive. Also, it remains the leading vendor providing mobile security to our politicians, military personnel and major corporations. As we move into an era when...

Should employers consider job seekers' social media posts when hiring?
Loading ... Loading ...

CRM Buyer Channels