The email fraud landscape is a constantly evolving one. Cybercriminals are always coming up with new and sophisticated ways to leverage email to do ha...
Increasingly, the virtual world of the Internet is converging with the physical world through the Internet of Things. As more physical devices connect to the Internet, hackers' reach and breadth expands exponentially. Today, Internet-enabled devices include TVs, home security systems, kitchen appliances, thermostats, and more.
Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.
Teenage runaways fall into two categories: chronic and episodic. Chronic running away is a routine power ploy that could involve substance abuse, while episodic running away involves isolated incidents in which a humiliating event, such as a pregnancy or fear of parental disapproval, triggers a teenager to flee home.
Cyberbullying and other risky behaviors associated with social media are increasing because children are receiving phones at younger and younger ages.
Ah, the Internet of Things. Just the sound of it sends thrills, chills and huge question marks through both technologists and regular people alike.
Based on research from other countries, analysts are predicting that while storefront retailers will see a decline in fraud, online credit card fraud will likely rise, since online purchases don't allow the extra level of security the chip provides.
The scarlet letter as a form of punishment is back, it's just not written in red anymore; it's written in Tweets, and Facebook posts, and blogs, and shares. Only it's even worse, because the punishment can be permanent -- you can never take it off.
the hard lesson learned from this exercise is the ability to identify those people whom I can add to my short list of truly trusted advisors and add myself to my superior's list of truly trusted advisors.
The mantra of every corporation should be, "Don't collect what you can't protect." It should matter not if you are the CEO of very large corporati...
In a classic case of unintended consequences, manufacturers of today's video and audio baby monitors are wishing they had thought a bit more about the security and privacy afforded to their products.
SHANGHAI -- On the American West Coast, it will be a picture of entrepreneurial optimism characterized by growth and opportunities. Back East at the political center inside the Beltway, a chilly atmosphere with shrill rhetoric awaits Xi.
The hack of AshleyMadison.com has been a wakeup call to many Americans that there's no such thing as a "safe" secret on the web -- but it should also be a wake-up call to another important group: the 28 million small businesses scattered across the U.S.
International law, while informative, does not spell out how nations (or companies under their jurisdiction) should go about enhancing their cybersecurity to account for emerging due diligence obligations. As a result, it's helpful to consider what leading nations and firms are doing in this regard.
As countries like the United Kingdom, Brazil, and China develop their data policies, the U.S. can offer a model that respects rule of law and individual rights. We can do it. This can happen.
It is with more than a little bemusement that I can report that Augusta, Georgia, is one of the hottest, cutting edge high tech centers in the country today, growing by leaps and bounds and poised to become a major center for cyber security.