No, I don't support hacking -- but I do support victims and I do support justice. "Noah" decided early on that he didn't believe the teen victim of a rape in Steubenville, Ohio was going to get justice.
As the New York Times itself admitted, traditional security technology such as firewalls and anti-virus were unable to stop recent cyber attacks. So how can organizations prevent such targeted cyber attacks? Following these four steps to cyber health is a good start.
Although the average computer user has little involvement with such significant security threats, the increasing prevalence of cybercrime places greater responsibility on consumers to protect their individual identities and personal information from hackers.
Like many activists before him, Aaron fell prey to a criminal justice system that entrenches the standing of the already powerful, and which has been used so many times to break unionists and stymie their organizing efforts.
Given the number of successful attacks we've seen in the past year, it's apparent that the security community is in need of a new approach. We can no longer afford to sit back and wait for attacks to hit our perimeter and hope that we can stop them -- that simply does not work.
For his latest subversive intervention, the self-described "contemporary artist and pirate" Paolo Cirio wants to give you the offshore tax benefits en...
As news of major breaches roll in like waves on a storm-eroded beach, the likelihood increases that the next war we fight will be waged on computers aimed at crippling the systems that keep the wheels of government and daily life turning.
Just a few hours before the State of the Union address, President Obama signed an executive order authorizing new policies to protect U.S. critical infrastructure cybersecurity. The call for additional legislation in this area acknowledges the need for continued vigilance.
What does "evidence of a major digital attack looming" look like? There are no convoys to see from a spy plane, no fleet heading sailing towards Hawaii. Without an idea of what this evidence is, the guidelines seem to justify preemptive attacks against just about anyone at any time.
When we're online, there are things we can control and things we can't. For example, we can control the passwords we use and what we say in social media. But sometimes we're victims of other people's carelessness or malice.
Sadly, even children as young as kindergarten are targeted by identity thieves now.
Computer users may be most vulnerable to a disturbing trend in hacking crimes in the comfort of their own homes. Follow these few steps to protect yourself and your loved ones from digital spying.
An identity thief can make life very difficult for you. As the hacks of the New York Times and Twitter prove, it's only a matter of time. And how can anyone in their right mind "Like" that?
Until email is phased out with new collaboration tools, out-of-band authentication combined with cloaking data is a proven way to thwart hackers that consumers and corporations should invest in to protect their assets.
If you think of your smartphone as just a phone, rather than a very powerful mini-computer that happens to make phone calls, you may be cruising for a world of pain.
Sad is the state that forgets that its power comes from the people. Would hackers be releasing documents and vandalizing government websites if they felt that they were being fairly treated and adequately represented?