We live in a time when databases have started to include a terrifying amount of extremely intimate information about illnesses, diagnoses, treatments and health issues that nobody should have to fear might become reading material for criminals or their customers.
As much as possible, never use simple passwords or, worse, use the same one on all of your accounts. Even if they are complicated, some websites have less security in protecting passwords. It is hard to memorize many passwords, but this is for your own good and the protection of your identity.
E-, virtual, online, and net are gradually disappearing: This is the conclusion reached by the prefix monitoring of ongoing UN-based negotiations on global digital policy (negotiations on the 10-year review of WSIS, the World Summit on the Information Society).
The holiday shopping season is just around the corner, but businesses aren't the only ones that will be profiting from the uptick in consumer spending - cybercriminals will be making plenty of money too.
By: Joe McGauley Credit: Shutterstock No one takes the time to actuall...
Cyberweaponry requires cyberdeterrence and new types of internet shields. Major U.S. corporations spend millions repairing damage from cyber infiltration, but devote hardly any resources to assessing potential risk sources and pre-emptive mitigation.
Steve Jobs is back all over the media and movie screens these days - as Hollywood portrays its take of his genius and his warts. At the end of the day (not the movie), Jobs' greatest notoriety may indeed be elevating Tim Cook to be his successor.
If you're like most people, Big Data may not mean much to you yet. It might even just make your eyes glaze over. Like the cloud or cybersecurity or bioprinting, it's just one more thing you don't have to know about -- until you do.
Computers, smart phones and other internet-enabled mobile devices are the primary vehicles we use to communicate and exchange information. Although this exposes us to potential cyber security risks, there are ways to limit the negative impact of a security breach.
The email fraud landscape is a constantly evolving one. Cybercriminals are always coming up with new and sophisticated ways to leverage email to do ha...
Increasingly, the virtual world of the Internet is converging with the physical world through the Internet of Things. As more physical devices connect to the Internet, hackers' reach and breadth expands exponentially. Today, Internet-enabled devices include TVs, home security systems, kitchen appliances, thermostats, and more.
Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.
Teenage runaways fall into two categories: chronic and episodic. Chronic running away is a routine power ploy that could involve substance abuse, while episodic running away involves isolated incidents in which a humiliating event, such as a pregnancy or fear of parental disapproval, triggers a teenager to flee home.
Cyberbullying and other risky behaviors associated with social media are increasing because children are receiving phones at younger and younger ages.
Ah, the Internet of Things. Just the sound of it sends thrills, chills and huge question marks through both technologists and regular people alike.
Based on research from other countries, analysts are predicting that while storefront retailers will see a decline in fraud, online credit card fraud will likely rise, since online purchases don't allow the extra level of security the chip provides.