By raising some of these important questions about data privacy, you will let them know that it's an issue that is a priority for you and should be for school administrators and teachers as well.
Patriarchy makes good use of the issue of privacy. Behind that curtain -- or those elevator doors -- it can still swagger and intimidate and hurt. Then, if the victim refuses to press the case, the state is reluctant to intervene.
Without the ability to use low-cost drones to see well beyond the horizon of earth-bound rangers, preventing wildlife crime will remain almost impossible and eco-guards will continue to wander into lethal fire fights with poachers.
BigPill Drug stores began in 1960 and grew to 35 stores by 1990. The company had more than 100 stores in 2000. It is now a publicly traded company, w...
Data and identity-related crimes are at record levels. Consumers are in uncharted territory, which raises a question: Is it time to do for data breaches and cybersecurity what the nutritional label did for food?
It is precisely because big data is so essential that regulators should thoughtfully pursue policies that allow the global Internet economy to grow responsibly, while taking care not to unnecessarily restrain this growth.
After the recent outbreak of leaked nude celebrity photos, I took to the street to capture the thoughts of the people! Is it okay that these pics were released? Did people look at them anyway? All I know is that dick pics are in high demand.
1. She knows brevity is commanding. While many in her shoes would take advantage of her media platform and have plenty to say about her virtual attackers, her official statement was two sentences.
The privacy and security of location-based apps has become a major concern for smartphone users around the globe. As the CEO of SCRUFF, one of the largest gay dating apps in the world, I take these reports seriously. While there are measures we have taken to protect our community, it's critical that all users understand the benefits and limitations intrinsic to location-based apps.
The Internet gives users immense power to affect the welfare of others. Malicious use of that power, such as the recent theft and release of nude photos of female celebrities, confronts users with a perplexing question: Does that power have moral boundaries?
By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app.
What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybercrime ring.
It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age.
Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into.
It's no longer a surprise to hear that a major company has had their customers' personal information compromised. Every day identity theft becomes mor...
co-authored by Dr. Stephen Bryen, Founder & Chairman Ziklag Systems ABI Research estimates that cyber security spending on the critical infrastructur...