Meet Anomaly Detection: A Powerful Cybersecurity Defense Mechanism When Its Weaknesses Are AddressedMarch 9, 2017
Anomaly Detection provides great security beneifts — but can also create serious problems. Please view the...
Inc.: Why You Can Ignore Calls to Change Your Passwords After Today’s Serious Password Leak AnnouncementFebruary 24, 2017
A bug in code used by Cloudflare, which provides security and performance services for millions of...
Parents Ordered By Government To Destroy Doll That Can Spy On Children and AdultsFebruary 20, 2017
Germany’s official regulator of telecommunications has ordered parents to destroy a tech-enhanced doll called My Friend...
3 Ways To Protect Your Healthcare Facility From Cyber DisastersFebruary 20, 2017
High-profile cybersecurity disasters targeting healthcare facilities and operations, such as the ransomware attack on Hollywood Presbyterian...
POSTS BY DATE
POSTS BY CATEGORY
- Artificial Intelligence (AI) (14)
- Book Review (9)
- Cool Tech (51)
- CryptoCurrency / BlockChain / ICO (30)
- CyberSecurity (361)
- Entrepreneurship (28)
- Events (14)
- In My Humble Opinion… (17)
- InfoGraphic (3)
- New York (14)
- News (135)
- Politics (35)
- Privacy (20)
- Product Review (2)
- Scams and Crime (63)
- Social Media (38)
- Toys / Children (10)
- Video (4)
JOIN MY NEWSLETTER