With Wi-Fi, your data is literally in the air, up for grabs by anyone with the right tools. It needs protection from nearby users who may want to free...
Never underestimate the brains of a young guy who still lives with his mother—at least not the case of 19-year-old Luis Flores, Jr., who was smart e...
Pauline MacDonald has done what few writers working in the area of Tibet could, or would, do. She has written about something other than the 'Issue Central' -- the impact of China's hardline policies in Tibet.
There are reports that Russian troops are using jamming equipment to disrupt communication between Ukraine forces, and that Russian troops allegedly cut Internet cables inside Crimea.
Imagine the hacker being debriefed by Gen. Alexander Bortnikov, Director of the FSB (successor to the KGB).
Social media is permeating every facet of our lives. It is extremely important to understand security and privacy settings with so much personal information becoming so accessible.
Antivirus programs are important, but they can't keep up with the rate that malware is evolving.
Pretend your laptop is a baby. In public, you wouldn't leave your baby unattended while you went to the restroom or moved around in your location.
Sorry, Mr. President.
Apple fans had a nice run, but it's time to face the fact that perhaps the only thing standing between most of us and a successful targeted cyberattack is our own behavior, not our operating systems.
Many executives are concerned about social media related risks (e.g., data security and ID theft), but far fewer actually have any social media traini...
Just remember that it all comes down to money: yours (that the criminals want), and the cold hard cash that some corporations and institutions haven't spent to keep your information secure.
I have a growing family. Camping is on my list of family events. The wife isn’t crazy about tents. So I went on Craigslist looking for a second hand...
Nations are taking varying approaches to enhancing critical infrastructure cybersecurity. What has emerged is a governance spectrum with the United States, United Kingdom, and India preferring a more voluntary approach, while other cyber powers, including China, are opting for a larger role for the state.
IT professionals are only as good as their weakest link: the rest of the employees who refuse to play a role in company security will bring down the ship.
While cybersecurity and privacy are certainly "shared challenges" as the government itself has not taken the appropriate steps to rectify its own privacy violations, the government must take leadership in creating enforceable measures for the private sector and other organizations that will prevent the casual manner in which many companies still treat data.