Apple has launched their their new digital wallet service, but not all North American retailers are on board with the new service. Retailers that are members of the Merchant Customer Exchange (MCX) organization are developing an alternative based around an app that uses visual QR codes. The app is called CurrentC, and is currently in… Read More »
Has Apple Pay Put An End To Credit Card Security Issues?
All across America today, retailers have begun to accept Apple Pay purchases using secure encryption, Touch ID and Apple iPhones. So is cash still king or have we crowned a new form of payment winner? Apple’s new smartphones and iPads use an NFC wireless module to communicate to a merchant’s payment terminal. Once connected, a… Read More »
Cybersecurity Insurance & What You Need To Know
Every company that uses computers or the Internet needs to protect their assets, but how can companies prepare for threats that are so new they’re not even recognized? New technology can open security holes that aren’t detected until after cyber criminals have already broken in. Hackers develop new viruses and other malware every day, faster… Read More »
Leaked Nude Photos Expose Cloud Security Risks
BVS CEO & Cyber Security Expert, Scott Schober provides security details on Inside Edition Last week’s leak of confidential celebrity photos has focused renewed public attention on the security risks of storing data in the cloud. The photos were originally posted on a seedy Internet site by an anonymous user, then reposted to other disreputable… Read More »
Is Your E-ZPass Spying on You?
E-ZPass is a type of RFID device called an electronic toll collector (ETC). Instead of waiting in line at the toll booth while the driver ahead of you searches for loose change, you simply drive on through. A wireless transponder activates the ETC, reads the ID number and the transportation department debits your account. ETCs… Read More »
Wiping Your Old Android Device Isn’t Enough
The average user’s upgrade cycle for smartphones and tablets is around two years. If the old device is still in good shape once the user upgrades, individual users and small businesses usually sell it or pass it along to someone else. Big companies send obsolete devices to companies that specialize in recycling end-of-life electronics.… Read More »
Safeguarding Digital Evidence on Wireless Devices
On June 25th, the US Supreme Court struck a blow for digital privacy rights by ruling that in most cases police must get a search warrant before searching a suspect’s cell phone. The court ruled unanimously on two separate cases, one involving a feature phone and the other a smartphone. There’s no question any cell… Read More »
Think only the military has drones? Think again.
Just a few years ago, only militaries and government agencies had access to sophisticated drones, but today anyone can buy them for just a few hundred dollars. The basic hardware has been around for decades in the form of remote-controlled helicopters. Today drone operators can equip them with high-definition cameras, Wi-Fi detection tools and other… Read More »
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- Next Page »