The minute hand of the Doomsday Clock will stay at five minutes to midnight for the year 2013, say the scientists and experts at The Bulletin of the Atomic Scientists who maintain one of the world's most famous time pieces.
How many times have your medical records been illegally accessed? It's a scary thought, but one that many of us will have to get used to unless big changes are made in the healthcare industry.
I thought it was great that the rep from the city attorney's office was a woman. So did my daughter. It showed a woman in a powerful, tech-related position, and I could see my daughter's wheels spinning.
I ran around the house this morning making sure the Java plugin was turned off in all our web browsers on all our computers. Why was I so panicked? Because the Department of Homeland Security issued a warning late this week about Java.
In few places on Earth is censorship undertaken more vigorously than it is in the People's Republic of China. But what does such censorship mean for the rest of the world's Internet users?
In a country where essential components of infrastructure are vulnerable to cyber-attack, cybersecurity is not only an issue of financial interest to private sector companies, but an issue of national security.
2013 will be the year of the mobile security threat. With online technology rapidly moving from computers to the palms of our hands, cybercriminals and hackers are evolving their methods to fit the times.
In the coming weeks, as we've seen every year for the past six, there will be endless reports detailing the digital dangers and identity threats lurking in every corner of our highly networked universe. But to what end?
Unfortunately, while women have made great strides in the realm of foreign policy, they remain underrepresented across the intelligence, defense and security community.
Security and flushing out the bad guys begins with understanding the web of associations between related devices, which helps businesses identify and shut down entire fraud rings. Lastly, online businesses run their highly-customized business rules as the transaction or activity is attempted.
Today, we are in danger of falling into a "cyber weapons gap" -- exaggerating the capabilities of the Chinese People's Liberation Army -- when it comes to waging cyber war.
The stress of holiday shopping often outweighs the joy of gift buying. As the Internet becomes more vital to the holiday buying and giving experience, our increasing online "connectedness" steers us toward an array of digital hazards.
This holiday season, mobile phones and tablets will be one of the top gifts on Christmas lists, and they'll become another digital repository for personal and private information. If you're giving or receiving these devices, take the extra steps to secure your gift with a mobile security option.
Imagine you felt passionate enough about a cause to place yourself in harm's way to support the side you believed in. Now imagine you could do this without leaving your living room and still step into the front lines of the battle.
We are familiar with the threat that cyber-crime poses to the computers around us -- however, we have not yet prepared for the threat it may pose to the computers inside of us.
Innovation is like a gas, it becomes more powerful the more it is compressed. Our hope is that by making it easier for the builders in NYC to meet one another and exchange ideas, we can help this community grow even faster and accomplish even more for bringing our city, our country and our world into the future.