Cyber-Resilience vs. Cyber-Security: Business Leaders Must Understand the DifferenceNovember 13, 2019
While most professionals living in the modern world understand the importance of cybersecurity, far fewer people...
Why File Based Attacks Still Inflict Severe Damage After 30+ YearsOctober 2, 2019
File-based cyberattacks, in which attackers send files, such as Microsoft Word documents or Adobe Acrobat PDFs,...
WhatsApp ‘Delete for Everyone’ Doesn’t Always ‘Delete For Everyone’September 18, 2019
WhatsApp, the world’s most popular chat and messaging app, offers a “Delete for Everyone” feature that...
Women’s Sexual Habits and Other Extremely Personal Information Were Shared With Facebook By Popular Period Tracking AppsSeptember 10, 2019
Two popular period-tracking apps are believed to have shared their users’ personal information – including details...
Incorrect Passwords Entered During Login Attempts Should Be Considered Private DataSeptember 5, 2019
While pretty much everyone in the modern world understands that passwords should be treated as private...
Encryption Company Sues CyberSecurity Conference After Getting Booed, Heckled, And RidiculedAugust 26, 2019
Cryptography startup, Crown Sterling, is suing the organizers of the Black Hat USA cybersecurity conference after...
POSTS BY DATE
POSTS BY CATEGORY
- Artificial Intelligence (AI) (7)
- Book Review (5)
- Cool Tech (39)
- CryptoCurrency / BlockChain / ICO (27)
- CyberSecurity (250)
- Entrepreneurship (25)
- Events (7)
- In My Humble Opinion… (12)
- InfoGraphic (1)
- New York (7)
- News (71)
- Politics (13)
- Privacy (6)
- Product Review (1)
- Scams and Crime (45)
- Social Media (31)
- Toys / Children (10)
- Video (4)
JOIN MY NEWSLETTER