Get in Touch
The recent Game of Phones between the FBI and Apple underscored an area in our jurisprudence that is screaming for more clarity. If there...
Most data breaches happen fast — in a matter of minutes, according to a new Verizon report — but the impact on you and your...
Anyone who’s read oddly positive online reviews or happened on Twitter users with suspiciously large followings knows that the Internet is full of fakes....
Information security is hard. Complete security is not just virtually implausible--it is pretty close to impossible. Enter BYOD--Bring Your Own Device--and the almost, practically,...
Tax Season is fraud season. It's prime time for fraudsters and scammers looking to steal your personal and financial data.
Scammers are using confusion about...
It’s tempting to ignore the warning sirens that blared Dallas out of bed last Saturday night, the work of a hacker. But that would...
When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the...
Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the...
Preparation, execution and monetization of any high-profile data breach that comes to mind requires multiple transactions between several tiers of co-conspirators. That collaboration takes place on the Darknet.
Yet despite...
Owned by the Alibaba Group, the UC Browser was developed by the Chinese mobile Internet company UCWeb to compete with Google’s Chrome browser, and...