As smartphones are increasingly used for financial transactions, sharing sensitive personal and proprietary information, and for operating other devices (such as home security systems), the field for intruders grows and becomes increasingly attractive.
This is Day 2 of my journal shooting my history on computer hacking at HOPE X Conference.
co-authored by Dr. Stephen Bryen, Chairman Ziklag Systems As the Wall Street Journal reports, many people are using two cellphones today -- one for w...
The U.S. has spent billions on cyber security, yet the problem is worsening. America's political leaders worry about a cyber "Pearl Harbor." Secretary of Defense Hagel, in his first major speech on the subject, is promising to triple the staff working to combat cyber terrorism. But will it work?
These powerful paths for connectivity have played a significant role in the destabilizing of authoritarian regimes. Yet with the power of social media come the perils of espionage and the temptation of apathy.
co-authored by Dr. Stephen Bryen, CEO Ziklag Systems Assistant Secretary of State Victoria Nuland called her colleague in the Ukraine to discuss the ...
co-authored by Dr. Stephen Bryen, CEO Ziklag Systems In politics, as in many other fields, there is always a desire to protect the leader. One way i...
co-authored by Dr. Stephen Bryen, CEO Ziklag Systems Now we know that among world leaders, NSA allegedly spied on Angela Merkel's mobile phone. We d...
It's important for parents to realize that just because you have parental controls on your computer, that doesn't mean your child is safe from online criminals. There are dozens of ways your kids could be targeted online, but here are the ones most likely to happen in your home.
Now that biometrics have officially gone mainstream with Apple's new fingerprint scanner on the iPhone 5S, does this mean that our privacy is even more at risk from snoopers, hackers, and identity thieves?
These days it is getting more and more difficult not to be a conspiracy theorist. If you are concerned about security, especially mobile phone security, the amount of angst has risen by now to unprecedented levels.
The digital age offers us immense opportunities to hone our detective skills, to observe our colleagues in an entirely new, not necessarily flattering light, and also presents tremendous challenges in terms of how we use that information.
The reality is, there's never been any such thing as online privacy. Just because the website you're on has a lock symbol in the address bar, doesn't mean it's 100 percent safe. Here are four ways you didn't know you could get hacked.
Pen and paper have largely been replaced by digital documents and cloud storage, yet law enforcement agencies and courts have had trouble honoring the Fourth Amendment in a world increasingly devoid of "papers and effects."
When you find yourself as a progressive liberal on the same side as Rand Paul and a whole lot of Tea Party activists and a large part of the Republican House caucus, the words "think again" might come to mind.
If you suspect that someone may be tracking you, examine all the apps on your device to see if there any that you didn't install.