Tag Archives: cybersecurity

cybersecurity

Three Essential Cybersecurity Questions

Businesses should take action to protect themselves and their customers

Cybersecurity is increasingly important to businesses of all sizes. Businesses should consider three questions to…

By Stephen L. Ball

Posted: Tags: , , , , , ,
massive

Massive Internet Outage Appears Resolved

Cyberattack against Dyn has been mitigated

Dyn was hit with a massive DDoS attack—Distributed Denial of Service. With DDoS attacks, computers,…

By Samara Lynn

Posted: Tags: , , , , , , ,
NCSA

The White House and NCSA Want You to Lock Down Your Login

The White House's new initiative to inform Americans about everyday cybersecurity

Most of us think a username and password are enough to stay safe on line;…

By Samara Lynn

Posted: Tags: , , , , , ,
Forney

The Road to TechConneXt: Renee Forney, Cybersecurity Specialist

The Road to TechConneXt is a lead-up series to Black Enterprise's TechConneXt Technology Summit, profiling today's tech leaders and innovators. This week: Cybersecurity Expert Renee Forney

Renee Forney is a seasoned cybersecurity expert. SC Magazine, the leading journal for IT security…

By Samara Lynn

Posted: Tags: , , , , , ,
#BE30DayChallenge

#BE30DayChallange Secure Your Digital Life: Week 4 – Put Your Defenses in Place

In this 30-day challenge, explore cutting-edge tech to secure your digital life and protect your identity

The #BE30DayChallenge to securing your digital life is, hopefully, motivation to take digital security seriously.
In…

By Samara Lynn

Posted: Tags: , , , , , , ,
#BE30DayChallenge

#BE30DayChallenge, Week 3: Shore Up Your Home Network

To better secure your digital life, challenge yourself to push your tech skills and lock down your home network

Our homes can have as many devices connected to the network as a small business…

By Samara Lynn

Posted: Tags: , , , , , ,
#BE30DayChallenge

#BE30DayChallenge: Secure Your Digital Life

In this 30-day challenge, take some time to take a few steps to secure your digital life

So much of our life is spent online, yet so many of us are not…

By Samara Lynn

Posted: Tags: , , , , , ,
#BE30DayChallenge

#BE30DayChallenge: Week 1, Lock Down Your Social Media

Use this week to be proactive in making small, yet significant changes to protect your social media accounts

It’s becoming all too familiar: That frantic post from a Facebook friend that reads something…

By Samara Lynn

Posted: Tags: , , , , , , , ,
email

5 Ways to Not Get Your Email Hacked

Save yourself some of Mrs. Clinton's headaches. Here are fives ways you can avoid becoming the victim of an email hack.

Save yourself some of Mrs. Clinton’s headaches. Here are fives ways you can avoid becoming…

By Samara Lynn

Posted: Tags: , , , , , , , ,
DNC

Cybersecurity Pros Familiar With Suspected DNC Email Hackers

The hackers and the methods they may have used to obtain the DNC emails are well known by those in the cybersecurity industry

When Wikileaks released thousands of emails from the Democratic National Committee (DNC), democrats called on cybersecurity technology…

By Samara Lynn

Posted: Tags: , , , , , , , ,
malware

Malware Drops to New Lows, but Florida is the Most Infected

We're getting savvier combating malware and with cybersecurity, but don't get too complacent, security company warns

A new report reveals computer virus and malware infections dropped 47.3% in the first half…

By Samara Lynn

Posted: Tags: , , , ,
iStock_000035515952_Medium

5 Ways to Tell if That Financial App is Really Safe

April is Financial Literacy Month. In its honor, here are ways to ensure you choose safe apps for your mobile financial services

The financial world is at our fingertips

By Samara Lynn

Posted: Tags: , , , , , , , , , ,
(Image: istock by Getty Images)

3 Reasons Apple and the FBI Both Lose on iPhone Issue

The nasty public battle between Apple and the FBI has repercussions for both entities

The nasty public battle between Apple and FBI has repercussions for both entities.

By Samara Lynn

Posted: Tags: , , , , ,
macbookair1-copy

How to Keep Your Mac Safe from Malware

A nasty bit of malware is infecting Mac computers. Here's how to tell if yours is infected and how to remedy the matter.

A nasty bit of malware is infecting Mac computers. Here’s how to tell if yours…

By Samara Lynn

Posted: Tags: , , , , , ,
Doug Bryant Jr

[Part 2] A Black Cybersecurity Pro Weighs in on Apple Fight and Security

An African American cybersecurity pro weighs in on Apple and other tech security matters

An African American cybersecurity pro weighs in on Apple and other tech security matters.

By Samara Lynn

Posted: Tags: , , , , , ,
Doug Bryant Jr

[Part 1] A Black Cybersecurity Pro Weighs in on Apple Fight and Tech Security

Doug Bryant is a certified ethical hacker and cybersecurity pro

Doug Bryant, Jr. is one of the relatively few black cybersecurity professionals. In a two-part…

By Samara Lynn

Posted: Tags: , , , , , , , , ,
Nissan Leaf

Nissan Leaf Security Hole Exposes Hacking Vulnerabilities of Connected Cars

Security experts find troubling vulnerability in the Nissan Leaf electric car

Some seriously lax security found on a Nissan electric vehicle underscores need for stricter security…

By Samara Lynn

Posted: Tags: , , , , ,
BE_John-and-Janice-McAfee

John McAfee: FBI’s Order to Apple is “Misuse” of Law

Cybersecurity guru John McAfee says the government is citing an antiquated statute

John McAfee weighs in on the conflict between Apple and the Department of Justice.

By Samara Lynn

Posted: Tags: , , , , , , ,
New Google logo

Google Will Give You 2 GB of Storage for Security

Secure your Google account and get 2 GB of Google Drive storage for free

Google pushes security with free storage space giveaway.

By Samara Lynn

Posted: Tags: , , , , , ,
Hacked_cybersecurity

Computer Infections Spiked During the ‘Blizzard’ of ’16

Jonas also brought in a blizzard of computer malware

Cybersecurity company reports significant increase in computer malware during the blizzard.

By Samara Lynn

Posted: Tags: , , , , , ,