As much as possible, never use simple passwords or, worse, use the same one on all of your accounts. Even if they are complicated, some websites have less security in protecting passwords. It is hard to memorize many passwords, but this is for your own good and the protection of your identity.
Cyberweaponry requires cyberdeterrence and new types of internet shields. Major U.S. corporations spend millions repairing damage from cyber infiltration, but devote hardly any resources to assessing potential risk sources and pre-emptive mitigation.
Increasingly, the virtual world of the Internet is converging with the physical world through the Internet of Things. As more physical devices connect to the Internet, hackers' reach and breadth expands exponentially. Today, Internet-enabled devices include TVs, home security systems, kitchen appliances, thermostats, and more.
Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.
The scarlet letter as a form of punishment is back, it's just not written in red anymore; it's written in Tweets, and Facebook posts, and blogs, and shares. Only it's even worse, because the punishment can be permanent -- you can never take it off.
The hack of AshleyMadison.com has been a wakeup call to many Americans that there's no such thing as a "safe" secret on the web -- but it should also be a wake-up call to another important group: the 28 million small businesses scattered across the U.S.
The OPM hack put them even further ahead by identifying 21 million American adults that have applied to work for the Federal government. No doubt espionage for China will remain the primary use for this data, but just as we update our view of identity in the 21st century so too might the PRC update its plans the use of such data.
As cars continue to rely on computers to increase capabilities, it leaves open to the possibility that any car can be hacked. A simple malware program in a car's software can cause havoc on the roads and ultimately take the lives of many people.
In the case of the Ashley Madison leak, the public doesn't seem to care much about the gravity of the crime and the long-term consequences of the hack. The victims are cheaters, mostly male, and they deserve it all. It's a poetic karma in full force, right? Wrong, I say.
In the real world, hacking gets a bad name, what with it being immoral (except in rare, delightful instances) and illegal. But in the world of cinema, it's a whole 'nother ballgame.
While on the surface this may seem like a deserved day of reckoning for exposed adulterers, it speaks to a much larger privacy issue that concerns everyone. We live our entire lives online, and our actions there hinge on the promise of privacy.
Gordon Gekko said it best in Oliver Stone's classic Wall Street, "The most valuable commodity in the world is information." Indeed, that's true, but of course, the ruthless insider trader played by Michael Douglas implored his young protégé Bud Fox (Charlie Sheen) to take it a little bit further.
Last weekend, TheUpshot published the most dangerous identity theft threat: the non-expert's tendency to underestimate the magnitude of problem.
We live in a world of technology where nothing is off limits. From human trafficking to revenge porn to hackers now taking over your private life without your knowledge. From tweens to teens to even young adults and seniors --- anyone with an active webcam is ripe for the picking.
Ashley Madison, the popular and much-maligned website for people who want to have extramarital affairs, was hacked this week. The headlines have read,...