An identity thief can make life very difficult for you. As the hacks of the New York Times and Twitter prove, it's only a matter of time. And how can anyone in their right mind "Like" that?
Until email is phased out with new collaboration tools, out-of-band authentication combined with cloaking data is a proven way to thwart hackers that consumers and corporations should invest in to protect their assets.
If you think of your smartphone as just a phone, rather than a very powerful mini-computer that happens to make phone calls, you may be cruising for a world of pain.
Sad is the state that forgets that its power comes from the people. Would hackers be releasing documents and vandalizing government websites if they felt that they were being fairly treated and adequately represented?
Do we protect the freedom of the individual citizen to disseminate knowledge for the benefit of other individuals to make informed decisions in the marketplace? Or do we protect the rights of corporations to restrict access to knowledge only to those individuals who can afford it?
In the end, the single most significant check on a prosecutor's discretion is not the judicial courts, nor the court of public opinion. The only realistic check lies in the integrity and professionalism of prosecutors.
How many times have your medical records been illegally accessed? It's a scary thought, but one that many of us will have to get used to unless big changes are made in the healthcare industry.
I thought it was great that the rep from the city attorney's office was a woman. So did my daughter. It showed a woman in a powerful, tech-related position, and I could see my daughter's wheels spinning.
I ran around the house this morning making sure the Java plugin was turned off in all our web browsers on all our computers. Why was I so panicked? Because the Department of Homeland Security issued a warning late this week about Java.
In a country where essential components of infrastructure are vulnerable to cyber-attack, cybersecurity is not only an issue of financial interest to private sector companies, but an issue of national security.
2013 will be the year of the mobile security threat. With online technology rapidly moving from computers to the palms of our hands, cybercriminals and hackers are evolving their methods to fit the times.
In the coming weeks, as we've seen every year for the past six, there will be endless reports detailing the digital dangers and identity threats lurking in every corner of our highly networked universe. But to what end?
Security and flushing out the bad guys begins with understanding the web of associations between related devices, which helps businesses identify and shut down entire fraud rings. Lastly, online businesses run their highly-customized business rules as the transaction or activity is attempted.
Imagine you felt passionate enough about a cause to place yourself in harm's way to support the side you believed in. Now imagine you could do this without leaving your living room and still step into the front lines of the battle.
Innovation is like a gas, it becomes more powerful the more it is compressed. Our hope is that by making it easier for the builders in NYC to meet one another and exchange ideas, we can help this community grow even faster and accomplish even more for bringing our city, our country and our world into the future.
Identity theft and financial fraud usually increase between Black Friday and Christmas Eve. So, what are the top scams to watch out for this holiday season?