Get in Touch
The treasure trove of stolen personal information which grows exponentially year after year on the Dark Web is attracting cyber criminals like ants to a picnic.
Thousands of commercial, government and...
“These apps are brutal,” Ondrej Krehel told me during a conversation about spyware, or “spouseware” as the software is sometimes called.
“It doesn’t matter what...
IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation.
For years,...
When Apple announced a serious hardware flaw last week, and the critical security patch that addressed it, my first thought was perhaps arbitrary: “That...
It has been almost four years since the massive Target data breach. Astoundingly, managing third-party risks still does not command the vigilance it should in all too many organizations.
The...
As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small-l and medium-size business owners. The growing popularity is...
Pet ownership has definite upsides. You get companionship and exercise and the satisfaction of doing a good deed. Plus, people who own pets live...
Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the...
You can't change your physical traits very easily, so if a hacker steals your biometric data--look out.
Scanning a fingerprint or even an eyeball to authenticate your...
WannaCry was a wake-up call. Petya is a wake-up call. Last I checked, wake-up calls were meant to bring about change.
After WannaCry, we saw...