SB 962 will provide especially important protections for our children, who are among the most avid smartphone users and often do not take steps to protect their private information.
You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats.
Recent U.S. history paints a clear picture of abuses by law enforcement and intelligence agencies, often with the approval of politicians. Despite paternalistic assurances that Americans have no reason to fear their own government, caution is warranted.
Part instant messaging client, part Siri-type virtual assistant, Emu can monitor everything you are talking about when you chat. Objectively, such an app sounds useful. But that's not the reality here, not when there's profitability involved based on your private data.
We often hear about teens oversharing content, however when it comes to parenting, experts agree, it is time parents put on the brakes before they post pictures of their children and other private family gatherings.
As smartphones are increasingly used for financial transactions, sharing sensitive personal and proprietary information, and for operating other devices (such as home security systems), the field for intruders grows and becomes increasingly attractive.
Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and credit card numbers. But there are other devices that hold sensitive data that we don't really talk about. For example, printers.
There's one born every minute. Many scammers use the names of valid lottery organizations, but this doesn't mean the legit entities are involved. The latest con is to tell someone they won a Powerball jackpot while planning on stealing their identity.
How far can government go in forcing people to reveal their identities, or protecting people from being forced to reveal their identities?
Privacy and the Internet mix like oil and water. As more websites gear up to provide transparency over the Web, privacy has taken on a new meeting in the virtual world.
co-authored by Tom Malatesta, CEO, Ziklag Systems For those focused on the subject matter, yesterday's Tweet fest from TeamAndIRC and Blackphone was ...
There are ways to keep the hackers at bay--for the most part, anyways, since no protection is 100 percent efficient.
You’ve surely heard of “B2B” or business-to-business marketing. The new game plan is “B2C” – business to consumer ...
The ripple effect continues to haunt Target: It's expected that seven of its board of directors members may be replaced because they failed to provide effective oversight into the corporation's data-protection risks. Boards simply need to be more proactive in safeguarding their companies against data breaches
Trying to trade away values and principles that should be cherished does not make America safer, but only makes enemies abroad and diminishes America everywhere.
You don't undo those things with better packaging, or a new release of an old product. You have to do the deep, soul-baring, painful work of repentance and asking forgiveness -- and do it without caring if this person ever comes to your church or not.