For Americans concerned about their privacy, the NSA data grabs are daunting, but what about the data grabs happening inside your own home, perpetrated not by the government but by your coffee machine?
From smartphones and tablets to smart TVs for the home, people are now connected to the digital world no matter where they go and what they do. But just how smart is leading a smart life?
I don't know enough about hacking and odds are you don't, either. I set out to learn more at DEF CON, a hacking conference with enough discussions on civil liberties, ethics and philosophy to delight a liberal arts major. Charged to "live an examined life," we should all think harder about our technology, privacy and security.
Qiu Xiaolong's Enigma of China is the kind of thing that writing teachers might dismiss as containing too many implausible dimensions -- except for the fact that almost all that was included is a direct transcript of China's current bizarre reality.
If you missed this year's Black Hat and DefCon hacking conferences in Las Vegas, take note: an array of futuristic hacks were revealed that could change the way we think about all of the gadgets, devices and machines that fill our lives.
Here are five things people do, which they shouldn't, that can really make life much harder than it needs to be.
Barrett is a member of a new generation of journalists who double as activists, those who recognize that dissent is fully warranted against a media complicit in creating the conditions for war.
The FDA dropped a bombshell on the health care industry last month, and companies are missing the quickest and easiest way to respond.
Any Internet user searching for the most recent updates on baby Prince George should keep in mind the following common celebrity Internet scams and hacker campaigns as royal mania reaches its peak over the coming weeks.
Mobile banking (mBanking) or text (SMS) banking refers to online banking that occurs via mobile phone rather than via a PC (online banking). The earli...
Recently a large number of people complained about their Gmail accounts being hacked. It also looks like Google's team is hard at work on the threads claiming that it was the users' fault for not being secure with their passwords.
Are PFC Bradley Manning's dumping of US State Department cables to WikiLeaks and Edward Snowden's theft of documents from Booz Allen, where he worked ...
Even if our phone is turned off, a hacker or intruder may have the means to turn the phone back on without letting you know. You won't see the screen light up or any other activity on the phone. But ON it is.
Banks do not hold the only responsibility for protecting financial information and customer funds. The average consumer possesses the necessary tools to help keep cyber-criminals from stealing money and pertinent data by following just a few simple precautions.
The likelihood that you will be exposed to a phishing scam at some point is relatively high. The question is what do you do when it does eventually happen, to keep both you and your friends safe.
Cyber security can be overwhelming and when you have to worry about all other aspects of running your businesses, it is often overlooked. Yet there are many things a small business owner can do to protect their information that don't take a lot of time, money or manpower.