When it comes to weighing the importance of civil liberties against fear of a terrorist attack (or everyday criminal activity), the Beltway is trapped in 2005.
It's easy, for instance, for a parent to access their child's name and Social Security number, then open up a phony account--even if the victim is literally a child. Most companies don't check the ages, so that's why this crime can go undetected for years.
co-authored by Dr. Stephen Bryen, Founder & Chairman, Ziklag Systems China has announced it will introduce a new computer operating system in October...
SB 962 will provide especially important protections for our children, who are among the most avid smartphone users and often do not take steps to protect their private information.
You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats.
Recent U.S. history paints a clear picture of abuses by law enforcement and intelligence agencies, often with the approval of politicians. Despite paternalistic assurances that Americans have no reason to fear their own government, caution is warranted.
Part instant messaging client, part Siri-type virtual assistant, Emu can monitor everything you are talking about when you chat. Objectively, such an app sounds useful. But that's not the reality here, not when there's profitability involved based on your private data.
We often hear about teens oversharing content, however when it comes to parenting, experts agree, it is time parents put on the brakes before they post pictures of their children and other private family gatherings.
As smartphones are increasingly used for financial transactions, sharing sensitive personal and proprietary information, and for operating other devices (such as home security systems), the field for intruders grows and becomes increasingly attractive.
OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced.
Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and credit card numbers. But there are other devices that hold sensitive data that we don't really talk about. For example, printers.
There's one born every minute. Many scammers use the names of valid lottery organizations, but this doesn't mean the legit entities are involved. The latest con is to tell someone they won a Powerball jackpot while planning on stealing their identity.
How far can government go in forcing people to reveal their identities, or protecting people from being forced to reveal their identities?
Privacy and the Internet mix like oil and water. As more websites gear up to provide transparency over the Web, privacy has taken on a new meeting in the virtual world.
co-authored by Tom Malatesta, CEO, Ziklag Systems For those focused on the subject matter, yesterday's Tweet fest from TeamAndIRC and Blackphone was ...
There are ways to keep the hackers at bay--for the most part, anyways, since no protection is 100 percent efficient.