The charges pursued against him equate to a dangerous precedent, especially for anyone who reports on hacking or leaks of stolen information. It means that one can be charged with fraud and identity theft for simply pasting a hyperlink.
It's important for parents to realize that just because you have parental controls on your computer, that doesn't mean your child is safe from online criminals. There are dozens of ways your kids could be targeted online, but here are the ones most likely to happen in your home.
When it comes to keeping your business safe, there's more to being mindful than simply bolting the front door when you leave for the day. When we cons...
Social networks are viewed with suspicion by the political establishment. Many governments are finding it increasingly difficult to control the public narrative in a world where information is available in realtime, and on an unfathomable scale.
History is change. Unless the United States does something radically different or unless the Chinese miracle of operating a booming economy in a repressive society implodes, the question is when China will surpass us economically. Not whether.
As we roll out the technology to implement the Affordable Care Act -- with millions of Americans signing up for the first time -- attempts to find and exploit weaknesses in the system are bound to increase.
Honesty is the best policy, right? I've spent my life being honest, and do you know what is the most important lesson I've learned is? The truth hurts...
It's like public health. If you don't get a flu shot, you're putting me at risk because -- if you get sick -- you might pass it on to others. Security flaws, too, can be infectious.
When you buy a car, the last thing you expect is for its on-board computer system to be hacked before you've even had a chance to break in your custom...
If you think the most common cyber scam still involves deposed Nigerian royalty eliciting your help to extract fortunes from African banks, your time machine has stalled. Cyber ninjas have become far more creative, sophisticated and inscrutable.
In order to provide adequate personnel and resources to combat and stop these threats, higher education institutions need to see the bigger picture of intense cyber security threats that can do more damage than a hacker stealing someone's email login.
Now that biometrics have officially gone mainstream with Apple's new fingerprint scanner on the iPhone 5S, does this mean that our privacy is even more at risk from snoopers, hackers, and identity thieves?
What will ultimately define any conflict with Syria is the fact that we will have crossed a digital line, where are enemies can retaliate quickly and effectively without launching a single plane or missile.
If these technologies are creating economic value and the jobs of tomorrow, community colleges are preparing graduates for the opportunities these jobs represent.
Mayor Bloomberg likes to take credit for transforming New York City into the second biggest technology economy in the country. Does he deserve it?
Journalist David Geer interviewed me. "A mobile phone is lost every 3.5 seconds. More than half of those devices are smartphones. 40% are not passw...