A brief flash of TV footage underscores a huge problem for all card-carrying Medicare recipients: they are sitting targets for identity theft. We need a paradigm shift in the way we see identify theft: the ultimate guardian of the consumer is the consumer.
The adult film industry is cracking down and shaming people into paying fines who upload and download porn. To get the links to the stories, go to ...
By David J. Hill Contributing Writer, Singularity University. If you use the web for more than just browsing (that's pretty much everyone), chances...
We need to be concerned that without a dedicated identity theft unit, the Brooklyn DA is failing to arm his prosecutors with the most effective and advanced tools to take on the most widespread crimes of a modern age.
ID theft happens everywhere in every type of company. In order for this to be avoided, companies need to review what protections and safeguards they have in place to protect this data from theft, and carefully vet employees who have access to it.
Whenever a celebrity scandal breaks, like Kristen Stewart's cheating on boyfriend Robert Pattinson, entertainment journalists aren't the only ones scrambling to get the story online -- so are hackers.
For years security experts have lectured us about the need to move on from this culture of passwords, but the cries have always been ignored -- perhaps until now.
Despite the warnings of generals, intelligence officers, corporate cyber security experts, and academic experts that America is dangerously vulnerable to attack in cyberspace, John McCain and the right wing Chamber of Commerce succeeded in blocking Senate action to improve our ability to defend America against cyber attack.
The "Party of No" hurt us all on a critically necessary piece of cyber-security legislation, and continued the U.S. Senate's proud tradition of failing to do anything to deal with our absolute vulnerability to an attack by state sponsored hackers and terrorists on our critical infrastructure.
CSA is much-needed right now to protect America's critical infrastructure systems from potentially devastating and costly attacks. Unfortunately, it's unlikely to overcome its political obstacles.
Three out of five U.S. adults online fear being hacked, but 69% of these same people engage in super-risky behaviors like using the same password everywhere. Why?
In Las Vegas this weekend, a different kind of Olympics is unfolding, with athletes testing their skills, determination and courage in digital contests at DEFCON, one of the oldest and most important hacker conventions in the world.
Launched last week by Fight for the Future, the IDL aims to broadly distribute code that will allow its members to quickly get the word out about threats and organize the Internet to act.
With cloud computing, the opportunity is clear. Public IT cloud revenue will grow to more than $70 billion by 2015.
The Constitution Project has worked as part of a broad coalition of privacy and civil liberties advocates to ensure that any cybersecurity bill incorporates robust safeguards for privacy and civil liberties.
In 1997, when influential annual hacking conference Black Hat was founded, the average person could be excused for not paying attention to what was happening in the hacker underground. But today it's time for everyone to learn about hacking threats.