Cyber Security

Zen in the Art of Digital Privacy

Zen in the Art of Digital Privacy

By

First, apologies to Eugen Herrigel, this article is in no way a reference to his exceptional book, Zen in the Art of Archery. I am not a Zen Buddhist (neither was he) and this is not an exploration of a particular religious teaching. It is, however, a request for us to look at privacy through […]

Shelly's iPhone Tracked by Apple

Apple is Tracking iPhone and iPad Users: FUD Times!

By

Restless leg syndrome, Vacuums that lose suction, Iraqi Weapons of Mass Destruction and most recently, Apple knows where you are and where you’ve been! It’s all FUD-mongering. (FUD is an acronym for fear, uncertainty and doubt.) And Apple has inspired a huge FUD cycle. It’s not surprising. People are always looking for things to be […]

Weapons of Digital Destruction

By

Cyber security experts have identified a sophisticated “cyber worm” designed to attack and destroy a physical, real-world target, like a factory or nuclear power plant.

FCC

Net Neutrality — Do Six Principles Make Sense?

By

On Monday, September 21, 2009, Federal Communications Commission (FCC) Chairman Julius Genachowski outlined the concrete actions he believes the Commission must take to preserve the free and open Internet. He said, "The Internet is an extraordinary platform for innovation, job creation, investment, and opportunity. It has unleashed the potential of entrepreneurs and enabled the launch and growth of small businesses across America. It is vital that we safeguard the free and open Internet."

Cloud Life Chronicles Part 2: Audrina, The Facebook Ninja

By

In our last episode, Debbie's Facebook account had been hijacked. She would receive random notes from her friends telling her that they suspected that her account had been hacked, but everything looked fine. Then, the cybercriminal opened a chat to me from her account typing, "... still stuck in London." Since, at that very moment, Debbie was standing next to me, it was pretty obvious we had a problem.