BigPill Drug stores began in 1960 and grew to 35 stores by 1990. The company had more than 100 stores in 2000. It is now a publicly traded company, w...
Data and identity-related crimes are at record levels. Consumers are in uncharted territory, which raises a question: Is it time to do for data breaches and cybersecurity what the nutritional label did for food?
It is precisely because big data is so essential that regulators should thoughtfully pursue policies that allow the global Internet economy to grow responsibly, while taking care not to unnecessarily restrain this growth.
After the recent outbreak of leaked nude celebrity photos, I took to the street to capture the thoughts of the people! Is it okay that these pics were released? Did people look at them anyway? All I know is that dick pics are in high demand.
1. She knows brevity is commanding. While many in her shoes would take advantage of her media platform and have plenty to say about her virtual attackers, her official statement was two sentences.
The privacy and security of location-based apps has become a major concern for smartphone users around the globe. As the CEO of SCRUFF, one of the largest gay dating apps in the world, I take these reports seriously. While there are measures we have taken to protect our community, it's critical that all users understand the benefits and limitations intrinsic to location-based apps.
The Internet gives users immense power to affect the welfare of others. Malicious use of that power, such as the recent theft and release of nude photos of female celebrities, confronts users with a perplexing question: Does that power have moral boundaries?
By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app.
What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybercrime ring.
It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age.
Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into.
It's no longer a surprise to hear that a major company has had their customers' personal information compromised. Every day identity theft becomes mor...
co-authored by Dr. Stephen Bryen, Founder & Chairman Ziklag Systems ABI Research estimates that cyber security spending on the critical infrastructur...
If you are a guy who has to assault a woman's dignity and privacy in order to fulfill your sexual fantasies, that says far more about you than it does about her.
It's our Internet, and if we don't take care of it, it won't take care of us.
If you are not particularly worried about being high-minded here, there is another consideration, which is, by looking at the pictures, you are giving criminals a purpose for their act (at least with a degree or so of separation) and causing someone distress. Is it really worth it?