"The Good Wife" took on several hot button issues with "Rape: A Modern Perspective." It was like the writers looked at what they had done all season and decided they weren't topical enough, so they threw together this episode.
There's nothing wrong with a little paranoia when it comes to keeping data on your smartphone safe. Thankfully, an award-winning mobile security software will keep you safe from unnecessary headaches.
The international hacker organization Anonymous perpetuated possibly its most foolhardy act yesterday when it hacked into and took over North Korea's Flickr and Twitter accounts.
Reporters Without Borders has been investigating countries that operate some of the most restrictive and oppressive areas of cyberspace. Syria and Iran join China, Bahrain and Vietnam on top of the list of five spy state. But how do they manage it?
Mobile connectivity is exploding and smartphones and tablets are whetting the appetites of cyber criminals and the population of hacker world. Any device that has information stored on it is vulnerable.
Every time you go to a new doctor or dentist and they give you a clipboard brimming with documents to fill out and sign, notice how they always ask for your Social Security number? Do you dutifully give it up? Did you ever wonder if they really need it?
The challenges are immediate and well-known, but the ingredients for more effective cybersecurity are within our grasp. It's important to understand two of the elements that are shaping our collective response to cybersecurity challenges
Sheryl Sandberg's advice -- Lean In -- is a positive and valuable one. It's ironic, however, that the company she helps run makes it hard for women business owners to do just that.
Some would argue that pornography is harmless. Others argue that it's immoral and brain changing. But, that's not the purpose of this article. Here,...
Like hanging on to clothes that don't fit, most of America's premier companies are starting to do essentially the same thing with data. The reason? They recognize the opportunity cost of not collecting data.
No, I don't support hacking -- but I do support victims and I do support justice. "Noah" decided early on that he didn't believe the teen victim of a rape in Steubenville, Ohio was going to get justice.
As the New York Times itself admitted, traditional security technology such as firewalls and anti-virus were unable to stop recent cyber attacks. So how can organizations prevent such targeted cyber attacks? Following these four steps to cyber health is a good start.
Although the average computer user has little involvement with such significant security threats, the increasing prevalence of cybercrime places greater responsibility on consumers to protect their individual identities and personal information from hackers.
Like many activists before him, Aaron fell prey to a criminal justice system that entrenches the standing of the already powerful, and which has been used so many times to break unionists and stymie their organizing efforts.
Given the number of successful attacks we've seen in the past year, it's apparent that the security community is in need of a new approach. We can no longer afford to sit back and wait for attacks to hit our perimeter and hope that we can stop them -- that simply does not work.
For his latest subversive intervention, the self-described "contemporary artist and pirate" Paolo Cirio wants to give you the offshore tax benefits en...