Get in Touch
Ransomware continues to pose a potent threat to individuals and, increasingly, to companies. What's worse, all signs point to ransomware attacks escalating the rest...
WannaCry was a wake-up call. Petya is a wake-up call. Last I checked, wake-up calls were meant to bring about change.
After WannaCry, we saw...
You can't change your physical traits very easily, so if a hacker steals your biometric data--look out.
Scanning a fingerprint or even an eyeball to authenticate your...
Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the...
Pet ownership has definite upsides. You get companionship and exercise and the satisfaction of doing a good deed. Plus, people who own pets live...
As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small-l and medium-size business owners. The growing popularity is...
It has been almost four years since the massive Target data breach. Astoundingly, managing third-party risks still does not command the vigilance it should in all too many organizations.
The...
When Apple announced a serious hardware flaw last week, and the critical security patch that addressed it, my first thought was perhaps arbitrary: “That...
IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation.
For years,...
“These apps are brutal,” Ondrej Krehel told me during a conversation about spyware, or “spouseware” as the software is sometimes called.
“It doesn’t matter what...