The ABCs of Hacking a Voting Machine A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
Every Week Is Shark Week in Cyberspace Your data, identities, and credentials are cyber chum. Here's how to protect yourself from the feeding frenzy.
72% of CEOs Steal Corporate IP from Former Employers Employees often take corporate IP because they feel ownership over their work, a trend security experts say is a problem.