As time passes following the FBI's announcement that it accessed the iPhone without Apple's help, I'm glad to see some of the answers are starting to take shape -- but the answers are not particularly good for Apple, or for the general public's right to privacy.
The San Bernardino terrorist suspect Syed Rizwan Farook used an iPhone 5c, which is now in the possession of the FBI. The iPhone is locked. The FBI wants Apple to help unlock it, presumably so they can glean additional evidence. Apple has declined.
These questions originally appeared on Quora - the knowledge sharing network where compelling questions are answered by people with unique insights. ...
The last several years have been good for criminal hackers and bad for consumers. From last year's unprecedented string of major retailer breaches to the massive JP Morgan hack and Sony's epic debacle, hackers have been almost unstoppable. So what should consumers expect for 2015?
For the most part, of course, technology today makes our lives simpler. Except when someone won't get off of our cloud, and we feel, as my friend said after losing her iPad, "lost, stupid, untethered, paranoid and violated."
In that bygone era of punched cards and tabulating machines, a computer disaster might have been a dropped box of cards. We couldn't do anything very exotic with these simple machines; the Internet and home computers were in no one's crystal ball, but neither was the worry of getting hacked.
Flip phones are certainly not "safer" than smartphones.
Co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag Systems The Pentagon has Plan X --a scheme to retaliate against cyber attacks. No one knows...
Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king's ransom of new clicks to kid-friendly content, hackers could well have a field day.
If you are a guy who has to assault a woman's dignity and privacy in order to fulfill your sexual fantasies, that says far more about you than it does about her.
I bet it was much more difficult to leak nudes back in the "oughts" and early twentieth century. You couldn't sit all day and night in a dark room with Slayer playing in the background. Leaking photographs of Theda Bara or Anna Pavlova took time and patience.
As smartphones are increasingly used for financial transactions, sharing sensitive personal and proprietary information, and for operating other devices (such as home security systems), the field for intruders grows and becomes increasingly attractive.
This is Day 2 of my journal shooting my history on computer hacking at HOPE X Conference.
co-authored by Dr. Stephen Bryen, Chairman Ziklag Systems As the Wall Street Journal reports, many people are using two cellphones today -- one for w...
The U.S. has spent billions on cyber security, yet the problem is worsening. America's political leaders worry about a cyber "Pearl Harbor." Secretary of Defense Hagel, in his first major speech on the subject, is promising to triple the staff working to combat cyber terrorism. But will it work?
These powerful paths for connectivity have played a significant role in the destabilizing of authoritarian regimes. Yet with the power of social media come the perils of espionage and the temptation of apathy.