Privacy and security are not opposing forces but mutually beneficial of each other and crucially intertwined as a means of protecting and advancing us. We need to protect them both in order to truly protect ourselves.
Encryption, a process that scrambles communications, allows only those with the decryption key to read one's messages. An encrypted message looks like random alphanumeric gibberish to the human eye. The longer the key, the more time and computer power it requires to unscramble.
A rekindled multi-stakeholder dialogue is needed to help clarify global privacy standards and flesh out the right to privacy mentioned in both the 1948 Universal Declaration of Human Rights and the 1966 International Covenant on Civil and Political Rights (ICCPR).
You'd be hard-pressed to find a member of Congress more vocal about the threat of identity theft and cyber-attacks than Rep. Lamar Smith, R-Texas. Sm...
Steve Jobs is back all over the media and movie screens these days - as Hollywood portrays its take of his genius and his warts. At the end of the day (not the movie), Jobs' greatest notoriety may indeed be elevating Tim Cook to be his successor.
The iOS 9 version allows users to install 3rd-party ad-blocking apps that control what content is allowed to display and run inside Safari. This includes blocking social widgets such as Facebook's "Like" and "Share" buttons.
Barging into a foreign data center would be a major invasion of that country's sovereignty. Imagine the uproar if foreign police tried to a similar move in the United States.
Every new technology can be used for good or ill. Such is the case with the newly developing field of behavioral biometrics, a technology that's not the same as the physiological "biometrics" many of us know well. The chart below differentiates the two categories.
As countries like the United Kingdom, Brazil, and China develop their data policies, the U.S. can offer a model that respects rule of law and individual rights. We can do it. This can happen.
Not everyone's intentions on the Internet are good. Hackers and online scammers target those of us over 50 because they expect us to be less computer savvy and more trusting. They want our money and our identities. With the following know-how, we're going to prevent those abusing the Internet from getting them!
Welcome to the Internet in the 21st century: where teenagers pretend to be 30-year-olds, and 30-year-olds act like teenagers. Let's change that, OK?
While on the surface this may seem like a deserved day of reckoning for exposed adulterers, it speaks to a much larger privacy issue that concerns everyone. We live our entire lives online, and our actions there hinge on the promise of privacy.
Data is being used by businesses in innovative and illustrious ways to generate widespread value. Companies should be as inventive in respecting users' wishes without inhibiting data's exponential promise for economic growth.
What makes a question like, "What is your favorite sports team?" a security risk? Isn't answering it supposed to enhance your security? Actually, such questions aren't intended primarily to enhance your security.
Sitting in a restaurant with a friend recently, I asked a simple question: How many cameras are in this place?
Since the Ashley Madison story broke, we've seen a wide range of reactions. Many folks are echoing the sentiments of the hackers, who, in their initial statement, called AM's membership "cheating dirtbags" who deserve the "very bad day" that is coming.