The latest greatest swindlers in the cybercrime racket know you're onto their digital three-card monte, and they've made a few adjustments, putting yet another wrinkle in the corporate-hacking game by targeting top-level employees for major profits.
Flip phones are certainly not "safer" than smartphones.
The Internet--one of history's greatest inventions--is also one of history's greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things.
There's a reason Gmail sent that email to your Spam folder. Leave it there. If you didn't ask for it, don't click on it!
co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag Systems Admiral Michael Rogers, Director of the National Security Agency and head of the U...
If the thought of being the unwitting star of your own prime time reality show gives you the willies, consider the recent revelation that more than 73,000 unsecured webcams and surveillance cameras are, as I write this column, viewable on a Russian-based website.
Most parents teach their children to be kind and caring -- but only IRL (in real life). So how do we teach Digital Kindness? My list of Dos and Don'ts gives families a checklist all technology users should memorize -- grown-ups included.
As the founder of an office yoga company, I'm constantly spreading the word about ways to bring yoga into your work day. I write about ways to deal wi...
With high-profile security breaches continuing to hit major national retailers, affecting tens of millions of shoppers since the 2013 holiday season, it's no surprise to see the that these events are influencing consumers to shop small businesses this year.
According to GoodSecurityQuestions.com (yes, there really is a site by that name, the best IT security questions meet five criteria.
He has spent a lot of time addressing the failings of big data systems and pushing for better infrastructure and security protocols across the board. He has even developed a consumer level data platform that mimics what the big guys should be doing.
As we head into the final stretch of 2014, large-scale financial and retail breaches are top-of-mind for many of us, especially as we get ready for holiday shopping. But here is another type of identity theft that all consumers should be aware of and begin to monitor for -- medical identity theft.
Remember that song from 1984, "Somebody's watching me?" It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home...through your computer.
While not a much-discussed topic during campaign season, federal policy on cyber-security will likely see some material changes as a result of a Republican-controlled Senate. Just how significant those changes will be have yet to be determined, but here are some thoughts on probably outcomes.
Co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag Systems The Pentagon has Plan X --a scheme to retaliate against cyber attacks. No one knows...
Last week, The Wall Street Journal detailed the challenges that drug safety authorities like the FDA face when tackling the illegal and unsafe distrib...