Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king's ransom of new clicks to kid-friendly content, hackers could well have a field day.
If you are a guy who has to assault a woman's dignity and privacy in order to fulfill your sexual fantasies, that says far more about you than it does about her.
I bet it was much more difficult to leak nudes back in the "oughts" and early twentieth century. You couldn't sit all day and night in a dark room with Slayer playing in the background. Leaking photographs of Theda Bara or Anna Pavlova took time and patience.
As smartphones are increasingly used for financial transactions, sharing sensitive personal and proprietary information, and for operating other devices (such as home security systems), the field for intruders grows and becomes increasingly attractive.
This is Day 2 of my journal shooting my history on computer hacking at HOPE X Conference.
co-authored by Dr. Stephen Bryen, Chairman Ziklag Systems As the Wall Street Journal reports, many people are using two cellphones today -- one for w...
The U.S. has spent billions on cyber security, yet the problem is worsening. America's political leaders worry about a cyber "Pearl Harbor." Secretary of Defense Hagel, in his first major speech on the subject, is promising to triple the staff working to combat cyber terrorism. But will it work?
These powerful paths for connectivity have played a significant role in the destabilizing of authoritarian regimes. Yet with the power of social media come the perils of espionage and the temptation of apathy.
co-authored by Dr. Stephen Bryen, CEO Ziklag Systems Assistant Secretary of State Victoria Nuland called her colleague in the Ukraine to discuss the ...
co-authored by Dr. Stephen Bryen, CEO Ziklag Systems In politics, as in many other fields, there is always a desire to protect the leader. One way i...
co-authored by Dr. Stephen Bryen, CEO Ziklag Systems Now we know that among world leaders, NSA allegedly spied on Angela Merkel's mobile phone. We d...
It's important for parents to realize that just because you have parental controls on your computer, that doesn't mean your child is safe from online criminals. There are dozens of ways your kids could be targeted online, but here are the ones most likely to happen in your home.
Now that biometrics have officially gone mainstream with Apple's new fingerprint scanner on the iPhone 5S, does this mean that our privacy is even more at risk from snoopers, hackers, and identity thieves?
These days it is getting more and more difficult not to be a conspiracy theorist. If you are concerned about security, especially mobile phone security, the amount of angst has risen by now to unprecedented levels.
The digital age offers us immense opportunities to hone our detective skills, to observe our colleagues in an entirely new, not necessarily flattering light, and also presents tremendous challenges in terms of how we use that information.
The reality is, there's never been any such thing as online privacy. Just because the website you're on has a lock symbol in the address bar, doesn't mean it's 100 percent safe. Here are four ways you didn't know you could get hacked.