For his latest subversive intervention, the self-described "contemporary artist and pirate" Paolo Cirio wants to give you the offshore tax benefits en...
As news of major breaches roll in like waves on a storm-eroded beach, the likelihood increases that the next war we fight will be waged on computers aimed at crippling the systems that keep the wheels of government and daily life turning.
Just a few hours before the State of the Union address, President Obama signed an executive order authorizing new policies to protect U.S. critical infrastructure cybersecurity. The call for additional legislation in this area acknowledges the need for continued vigilance.
What does "evidence of a major digital attack looming" look like? There are no convoys to see from a spy plane, no fleet heading sailing towards Hawaii. Without an idea of what this evidence is, the guidelines seem to justify preemptive attacks against just about anyone at any time.
When we're online, there are things we can control and things we can't. For example, we can control the passwords we use and what we say in social media. But sometimes we're victims of other people's carelessness or malice.
Sadly, even children as young as kindergarten are targeted by identity thieves now.
Computer users may be most vulnerable to a disturbing trend in hacking crimes in the comfort of their own homes. Follow these few steps to protect yourself and your loved ones from digital spying.
An identity thief can make life very difficult for you. As the hacks of the New York Times and Twitter prove, it's only a matter of time. And how can anyone in their right mind "Like" that?
Until email is phased out with new collaboration tools, out-of-band authentication combined with cloaking data is a proven way to thwart hackers that consumers and corporations should invest in to protect their assets.
If you think of your smartphone as just a phone, rather than a very powerful mini-computer that happens to make phone calls, you may be cruising for a world of pain.
Sad is the state that forgets that its power comes from the people. Would hackers be releasing documents and vandalizing government websites if they felt that they were being fairly treated and adequately represented?
Do we protect the freedom of the individual citizen to disseminate knowledge for the benefit of other individuals to make informed decisions in the marketplace? Or do we protect the rights of corporations to restrict access to knowledge only to those individuals who can afford it?
In the end, the single most significant check on a prosecutor's discretion is not the judicial courts, nor the court of public opinion. The only realistic check lies in the integrity and professionalism of prosecutors.
How many times have your medical records been illegally accessed? It's a scary thought, but one that many of us will have to get used to unless big changes are made in the healthcare industry.
I thought it was great that the rep from the city attorney's office was a woman. So did my daughter. It showed a woman in a powerful, tech-related position, and I could see my daughter's wheels spinning.
I ran around the house this morning making sure the Java plugin was turned off in all our web browsers on all our computers. Why was I so panicked? Because the Department of Homeland Security issued a warning late this week about Java.