Unless healthcare executives begin making significant changes now to their security setups, we could see many more breaches hit this industry.
"USB Killer" is a device, which can literally fry your computer. The device was hand-made by a Russian hacker, nicknamed as Dark Purple.
Our kids aren't all that different then we were at this age. But their access to social media makes their quickly made decisions capable of being a little bigger, a little louder, have a little more impact, a bigger punch, if you will.
We are placing far too much trust and reliance in technology. Despite all of our advances in artificial intelligence, the most powerful computer we know of is the human mind. But there is no system or technology that can eradicate the potential consequences of human error.
Humor me because you know that anyone over 50 knows that the trusty Blackberry with its keyboard makes life so much better.
The Democratic and Republican gristmills got to work last week on Hillary Clinton's "homebrew" email, and the ensuing firestorm underscored an alarming lack of cyber-savvy among the leading players of the 2016 election. It also raised a serious question: Should the Secret Service protect presidential candidates from cyber attacks?
Marc Goodman is a one-man Geek Squad who began his law enforcement career as a beat cop in Los Angeles and became the departmental computer expert. With a nose for wrongdoing and digital aptitude, Marc has served as the FBI's Futurist in Residence, Interpol advisor, lecturer and now author.
For nearly 20 years, Dr. Diana L. Burley has acted as a consultant to corporations and government agencies in navigating issues related to IT-enabled change, cybersecurity workforce development and knowledge management.
Failing to take noral precautions with cyber security can wreck your day -- and all of the days you have coming. All of the talk about cyber security, hackers and identity theft can leave the average person befuddled.
Given today's threat-filled landscape, no data is ever 100 percent secure. But by getting back to "basic blocking and tackling" by implementing simple or even mid-level controls, you can minimize and even mitigate a high percentage of the chances and affects of a breach.
BAM! There it is. Right in your face one morning when you check your social feed as news. That nasty little something that someone, a bot, or ...
"The exponential improvement in the elements of computing is not about to run out of gas. We've got generations more of it to go. Geeks out there are going to take that computational power and that ocean of data and do things that astonish us."
In the coming months, we can expect more curves, as we watch the lines connecting problems and solutions for net neutrality.
Hackathons are taking the world by storm, and at the forefront of this movement is former MHacks Organizer Dave Fontenot.
Cyberterrorism is on the upswing and algorithmic terrorism is the next iteration. So much of our economy is underpinned by electronic trading that protecting the markets is paramount.
Computers run the world--our airports, airplanes, cars, hospitals, stock markets and power grids--and these computers too are shockingly vulnerable to attack. Though we're racing forward at breakneck speed to connect all the objects in our physical world to the Internet, we still fundamentally do not have the trustworthy computing required to make it so.