China may be more explicit about "Internet sovereignty," but the U.S. and other Western nations themselves have encouraged the emergence of virtual borders as both a prudent response to the demands of civil society and as a means to promote their preferred modes of governance. China simply represents an extreme example of a much wider phenomena.
What Anonymous is engaged in is nothing short of intimidation. If you truly value free speech and an open, discourse, this kind of action should scare you. To see self-proclaimed liberals carrying torches and cheering as someone's website is defaced for the merely content of their speech, is profoundly disappointing, especially because there are so many legitimate ways to handle people like Trump or the Westboro Baptists.
One of the best ways to protect your tax return information is to file your tax return as early as possible, and for most people that starts around mid-January. If you file your return first, an identity thief won't be able to.
Growing up in a cyber world, young adults and youth are bombarded with social media statistics that define their online usage using numbers and values.
Why aren't smart phone users paying at stores with their phones? The short answer to this complex question is user loyalty incentives that integrate with a centralized mobile payment hubs and education on the security standards of mobile payment systems.
Jacob Appelbaum's opening remarks at the World Forum for Democracy 2015, posted November 20th, should be required viewing on the internet today as the power brokers of the world meet in Paris to discuss climate catastrophe shadowed by terrorism.
I did not want to be so dramatic, but I could not help but be completely honest as well. The end possibility is that your entire organization may suffer the fate of Sony Pictures, target, Anthem and others who have been shaken by hacks and vulnerabilities in their networks.
It is difficult to think of two issues with a greater potential to negatively impact both our environment and the global economy than climate change a...
Every day criminals are finding new ways to compromise devices and steal identities. While consumers understand this, many still don't take the necessary precautions to stay safe. Next time you think about casting security aside and sharing your password with a friend, imagine what you could do with an extra $300.
The November 13 attacks in Paris were tragic, and our hearts and thoughts are with the people of Paris. We stand ready to work with law enforcement to prevent future such horrific incidents.
A couple of years ago when some 40 million credit cards were breached at Target's brick-and-mortar stores, I frantically tried to recall if I had done any holiday shopping at my neighborhood store. Thankfully I hadn't, but my relief was short-lived.
Encryption, a process that scrambles communications, allows only those with the decryption key to read one's messages. An encrypted message looks like random alphanumeric gibberish to the human eye. The longer the key, the more time and computer power it requires to unscramble.
In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60 percent over the previous year. There will be 10 billion IoT devices connected to the Internet this year.
The man-in-the-middle attack is a tricky one for consumers because most of the time victims don't even know they've been hacked. It's a silent attack and hard to detect unless you know what you're looking for.
To really hide online, you need to do it in plain sight. That means you will have to create an entire fake online persona -- on Facebook. Google, Twitter, even LinkedIn -- using this identity. Do not link any of those accounts to your actual identity or your real email address.
As someone who works in the cybersecurity industry, I know that the November to December timeframe is when many consumers and businesses will get hacked or defrauded. In many ways, the holiday season is an ideal time for cybercriminals.