By: Joe McGauley Credit: Shutterstock No one takes the time to actuall...
Cyberweaponry requires cyberdeterrence and new types of internet shields. Major U.S. corporations spend millions repairing damage from cyber infiltration, but devote hardly any resources to assessing potential risk sources and pre-emptive mitigation.
Steve Jobs is back all over the media and movie screens these days - as Hollywood portrays its take of his genius and his warts. At the end of the day (not the movie), Jobs' greatest notoriety may indeed be elevating Tim Cook to be his successor.
If you're like most people, Big Data may not mean much to you yet. It might even just make your eyes glaze over. Like the cloud or cybersecurity or bioprinting, it's just one more thing you don't have to know about -- until you do.
Computers, smart phones and other internet-enabled mobile devices are the primary vehicles we use to communicate and exchange information. Although this exposes us to potential cyber security risks, there are ways to limit the negative impact of a security breach.
The email fraud landscape is a constantly evolving one. Cybercriminals are always coming up with new and sophisticated ways to leverage email to do ha...
Increasingly, the virtual world of the Internet is converging with the physical world through the Internet of Things. As more physical devices connect to the Internet, hackers' reach and breadth expands exponentially. Today, Internet-enabled devices include TVs, home security systems, kitchen appliances, thermostats, and more.
Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.
Teenage runaways fall into two categories: chronic and episodic. Chronic running away is a routine power ploy that could involve substance abuse, while episodic running away involves isolated incidents in which a humiliating event, such as a pregnancy or fear of parental disapproval, triggers a teenager to flee home.
Cyberbullying and other risky behaviors associated with social media are increasing because children are receiving phones at younger and younger ages.
Ah, the Internet of Things. Just the sound of it sends thrills, chills and huge question marks through both technologists and regular people alike.
Based on research from other countries, analysts are predicting that while storefront retailers will see a decline in fraud, online credit card fraud will likely rise, since online purchases don't allow the extra level of security the chip provides.
The scarlet letter as a form of punishment is back, it's just not written in red anymore; it's written in Tweets, and Facebook posts, and blogs, and shares. Only it's even worse, because the punishment can be permanent -- you can never take it off.
the hard lesson learned from this exercise is the ability to identify those people whom I can add to my short list of truly trusted advisors and add myself to my superior's list of truly trusted advisors.
The mantra of every corporation should be, "Don't collect what you can't protect." It should matter not if you are the CEO of very large corporati...
In a classic case of unintended consequences, manufacturers of today's video and audio baby monitors are wishing they had thought a bit more about the security and privacy afforded to their products.