[INFOGRAPHIC] Cybersecurity Risks Facing Your StartupsHUB International VP Arturo Perez-Reyes helps us visualize the data breach risks faced by small business owners daily.
United States Intelligence Chief: Foreign Hackers Are Spying On Presidential CampaignsThe United States sees evidence that hackers, possibly working for foreign governments, are snooping on the presidential candidates, the nation's intelligence chief said Wednesday. Government officials are working with the campaigns to tighten security as the race for the White House intensifies.
Probe: Iran Responsible For 2013 Cyberattack On Westchester County DamIn 2013, hackers accessed the control system at the Bowman Avenue Dam, a small structure in Rye Brook, about 20 miles north of NYC that's used for flood control.
Health Watch: Can Medical Devices Be Attacked By Hackers?The FDA has issued an alert warning health providers to discontinue use of some specific IV pumps due to their susceptibility to cybersecurity attacks.
Report: Iranian Hackers Gained Access To Westchester County Dam In 2013The Wall Street Journal reports that hackers gained access to the Bowman Avenue Dam through a cellular modem and used their access to probe the dam's system.
New Jersey Assemblyman Hosts Summit On CybersecurityAssembly Republican leader Jon Bramnick invited state Homeland Security officials and business leaders, WCBS 880's Peter Haskell reported.
Smart Mouse: Using Your Grip As Your Computer PasswordThe “Biometric Pressure Grip” is a sensor that measures how hard and how tightly someone holds a mouse, then uses that information as part of a multi-step login process.
Education Of A Hacker: One Woman’s JourneyAs a “security aide” typist, Jen Havermann got her first exposure to computers while digging through databases.
Conn. Launches Cybersecurity Plan To Keep Utilities Safe From AttackWith Gov. Malloy's announcement Monday, Connecticut became the first state to outline a cybersecurity plan in conjunction with the utilities.
Computer Ransom: Your Personal Files Hijacked And Held HostageImagine your personal information and all your computer files being taken, hijacked and held for ransom. That is exactly what happens in the latest cyberscam.