In the coming weeks, as we've seen every year for the past six, there will be endless reports detailing the digital dangers and identity threats lurking in every corner of our highly networked universe. But to what end?
Security and flushing out the bad guys begins with understanding the web of associations between related devices, which helps businesses identify and shut down entire fraud rings. Lastly, online businesses run their highly-customized business rules as the transaction or activity is attempted.
Imagine you felt passionate enough about a cause to place yourself in harm's way to support the side you believed in. Now imagine you could do this without leaving your living room and still step into the front lines of the battle.
Innovation is like a gas, it becomes more powerful the more it is compressed. Our hope is that by making it easier for the builders in NYC to meet one another and exchange ideas, we can help this community grow even faster and accomplish even more for bringing our city, our country and our world into the future.
Identity theft and financial fraud usually increase between Black Friday and Christmas Eve. So, what are the top scams to watch out for this holiday season?
Computers owned by the SEC Trading and Markets division were brought by SEC staffers to a hacker convention. They contained unencrypted, step-by-step instructions to shut down our financial trading system. Essentially: A Hacker's Guide to our Financial Universe.
In 2010, computer scientists from the University of Michigan and Princeton hacked a touch-screen voting machine, installing the video game Pac-Man. Could comparable voting systems in Ohio be subverted to alter the presidential vote tally?
It may sound like a scene from a zombie apocalypse movie, but it could be your life -- a nationwide cyber-version of Ground Zero. Think of it as 9/11/2015.
The story of Anonymous hasn't been told because it's probably just begun. But the documentary We Are Legion: The Story of the Hacktivists is a really good beginning to that story.
How will you know when the "cyber Pearl Harbor" has occurred? When the lights and heat in your home go off. When you can't make a phone call. When no ATM works. When your flight cannot land.
We hear a lot of genuine concern about the growing number and sophistication of hacker attacks. But based on the information contained in this report, the sad truth is that our own government's security policies -- or lack thereof -- have put us all at risk.
As the Internet becomes a more lucrative ground for corporate interests, the likelihood of censorship of inflammatory content increases. Which is why some techies are trying to scrap the Internet we have and build a new one.
If a disruption of service for less than eight hours will make this big of a splash on the internet, as is the intent of recent cybersecurity legislation, imagine what a complete shutdown of the internet will do.
The adult film industry is cracking down and shaming people into paying fines who upload and download porn. To get the links to the stories, go to ...
By David J. Hill Contributing Writer, Singularity University. If you use the web for more than just browsing (that's pretty much everyone), chances...
Whenever a celebrity scandal breaks, like Kristen Stewart's cheating on boyfriend Robert Pattinson, entertainment journalists aren't the only ones scrambling to get the story online -- so are hackers.