What can FinFisher and other tools do? On mobile platforms they can record voice calls, SMS messages and emails. The software can place "silent calls" -- that is, turning your phone on when you are unaware it is active.
The market risks associated with real-time reporting became a reality last month, as a Twitter hoax claiming that an explosion occurred at the White House injuring President Obama led to a 150-point drop, a $136 billion market value, in the Dow Jones industrial average.
Once again we come back to the very real threat this kind of malware presents to the small- to medium-sized business who will very commonly use these kinds of free and open source tools to build up and maintain their online presence.
It's fairly safe to assume that calendars, call logs, contacts, emails, financial data, text messages, photos and videos stored on smartphones or mobile devices are at risk of being monitored or stolen.
In 2009, my friend Mike was getting into bitcoin and I remember him explaining the whole concept to me: A virtual currency managed by a peer-to-peer network open to anyone with a computer and uncontrolled by any bank or government.
"The Good Wife" took on several hot button issues with "Rape: A Modern Perspective." It was like the writers looked at what they had done all season and decided they weren't topical enough, so they threw together this episode.
There's nothing wrong with a little paranoia when it comes to keeping data on your smartphone safe. Thankfully, an award-winning mobile security software will keep you safe from unnecessary headaches.
The international hacker organization Anonymous perpetuated possibly its most foolhardy act yesterday when it hacked into and took over North Korea's Flickr and Twitter accounts.
Reporters Without Borders has been investigating countries that operate some of the most restrictive and oppressive areas of cyberspace. Syria and Iran join China, Bahrain and Vietnam on top of the list of five spy state. But how do they manage it?
Mobile connectivity is exploding and smartphones and tablets are whetting the appetites of cyber criminals and the population of hacker world. Any device that has information stored on it is vulnerable.
Every time you go to a new doctor or dentist and they give you a clipboard brimming with documents to fill out and sign, notice how they always ask for your Social Security number? Do you dutifully give it up? Did you ever wonder if they really need it?
The challenges are immediate and well-known, but the ingredients for more effective cybersecurity are within our grasp. It's important to understand two of the elements that are shaping our collective response to cybersecurity challenges
Sheryl Sandberg's advice -- Lean In -- is a positive and valuable one. It's ironic, however, that the company she helps run makes it hard for women business owners to do just that.
Some would argue that pornography is harmless. Others argue that it's immoral and brain changing. But, that's not the purpose of this article. Here,...
Like hanging on to clothes that don't fit, most of America's premier companies are starting to do essentially the same thing with data. The reason? They recognize the opportunity cost of not collecting data.