Cybercrime is a massive multinational industry that regularly makes many attempts to breach major institutions. Why so many of those efforts have been succeeding lately, on such a large scale, is due partly to how smart an organization needs to be to defend against them.
Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king's ransom of new clicks to kid-friendly content, hackers could well have a field day.
Home Depot hasn't really told us much about their data breach so far, and for that, I say shame on them. One of the few things they did share though, and quite categorically, is that no debit card PINs were exposed in the breach.
If you watched this drama closely, you surely noticed how narrowly we conceptualize corruption in America. In effect, general influence peddling and election purchasing, which we see more commonly, are legitimate.
co-authored by Dr. Stephen Bryen, Founder & CEO ZiklagSystems Something is wrong with Home Depot's explanation of the hack on the point of their cas...
I slowly dialed the FBI field office in Chicago and listened to the numerous voice prompts. Not sure what to press, I eventually chose '3' since I am a media representative. A female agent answered. "Who would I speak to if, uh, compromising material was stolen from my phone?" I asked.
By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app.
What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybercrime ring.
It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age.
Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into.
Obama's opponents have cynically treated these challenges as political footballs, sweeping them into their relentless narrative of a weak, vacillating and dangerous president and a feckless NATO. But NATO's leaders impressively rallied around the administration's plans, approving a sweeping series of actions that should -- but probably won't -- quiet the critics.
co-authored by Dr. Stephen Bryen, Founder & Chairman Ziklag Systems ABI Research estimates that cyber security spending on the critical infrastructur...
As the smoke clears from this latest attack on privacy and our collective sense of decency, it's becoming more and more likely that a deft use of personally identifiable information was used to unlock the nude celebrity photo troves that flooded the Internet.
If the Home Depot breach turns out to be as bad or worse than the Target breach, certain things will be unavoidable for the home improvement giant. But there are some things the company can do to help reduce the short and long term impact and cost.
It's our Internet, and if we don't take care of it, it won't take care of us.
If you are not particularly worried about being high-minded here, there is another consideration, which is, by looking at the pictures, you are giving criminals a purpose for their act (at least with a degree or so of separation) and causing someone distress. Is it really worth it?