When you buy a car, the last thing you expect is for its on-board computer system to be hacked before you've even had a chance to break in your custom...
If you think the most common cyber scam still involves deposed Nigerian royalty eliciting your help to extract fortunes from African banks, your time machine has stalled. Cyber ninjas have become far more creative, sophisticated and inscrutable.
In order to provide adequate personnel and resources to combat and stop these threats, higher education institutions need to see the bigger picture of intense cyber security threats that can do more damage than a hacker stealing someone's email login.
Now that biometrics have officially gone mainstream with Apple's new fingerprint scanner on the iPhone 5S, does this mean that our privacy is even more at risk from snoopers, hackers, and identity thieves?
What will ultimately define any conflict with Syria is the fact that we will have crossed a digital line, where are enemies can retaliate quickly and effectively without launching a single plane or missile.
If these technologies are creating economic value and the jobs of tomorrow, community colleges are preparing graduates for the opportunities these jobs represent.
Mayor Bloomberg likes to take credit for transforming New York City into the second biggest technology economy in the country. Does he deserve it?
Journalist David Geer interviewed me. "A mobile phone is lost every 3.5 seconds. More than half of those devices are smartphones. 40% are not passw...
The reality is, there's never been any such thing as online privacy. Just because the website you're on has a lock symbol in the address bar, doesn't mean it's 100 percent safe. Here are four ways you didn't know you could get hacked.
co-authored by Dr. Stephen Bryen, CEO Ziklag Systems Apple is installing a finger print reader on its new 5S phone. The idea behind it is that a fin...
Every year on September 11, we mourn the nearly 3,000 people who lost their lives that tragic day. We honor the firefighters, police officers and first responders who risked and gave their lives to save so many others.
There are many complex issues related to online data and cybersecurity. The complexity of dealing with all of these aspects ought not prevent focusing on the parts where we can make meaningful progress.
The politics of the Affordable Care Act are irrelevant. The issue for me is privacy and data security and whether you're for Obamacare or against it, there are two ways the program's rollout could put your personal information at risk.
Beware! There are criminals in our midst. We can't see them, but they're around, waiting for our laptops, PCs or work computers to succumb to a virus ...
When it comes to cyber deterrence, the revolutionary idea for policy makers to get their heads around is that the public and private sector need to be better informed on discussions pertaining to a state's cyber war capabilities.
If the government is going to continue the practice of forcing private companies to hand over users’ private information in the name of national security, then the American public should have a right to know which companies are being asked and how often.