Cyber Security

Anthony Weiner

Congressman Weiner and Sexting Amongst Friends

By

We like to warn our children about many things and lately sexting has been on the top of the list. We caution against it, put applications in place to prevent it, and even treat kids as criminals over it. However, it is us adults who are getting far more press about it lately than kids […]

Zen in the Art of Digital Privacy

Zen in the Art of Digital Privacy

By

First, apologies to Eugen Herrigel, this article is in no way a reference to his exceptional book, Zen in the Art of Archery. I am not a Zen Buddhist (neither was he) and this is not an exploration of a particular religious teaching. It is, however, a request for us to look at privacy through […]

Shelly's iPhone Tracked by Apple

Apple is Tracking iPhone and iPad Users: FUD Times!

By

Restless leg syndrome, Vacuums that lose suction, Iraqi Weapons of Mass Destruction and most recently, Apple knows where you are and where you’ve been! It’s all FUD-mongering. (FUD is an acronym for fear, uncertainty and doubt.) And Apple has inspired a huge FUD cycle. It’s not surprising. People are always looking for things to be […]

Weapons of Digital Destruction

By

Cyber security experts have identified a sophisticated “cyber worm” designed to attack and destroy a physical, real-world target, like a factory or nuclear power plant.

FCC

Net Neutrality — Do Six Principles Make Sense?

By

On Monday, September 21, 2009, Federal Communications Commission (FCC) Chairman Julius Genachowski outlined the concrete actions he believes the Commission must take to preserve the free and open Internet. He said, "The Internet is an extraordinary platform for innovation, job creation, investment, and opportunity. It has unleashed the potential of entrepreneurs and enabled the launch and growth of small businesses across America. It is vital that we safeguard the free and open Internet."

Cloud Life Chronicles Part 2: Audrina, The Facebook Ninja

By

In our last episode, Debbie's Facebook account had been hijacked. She would receive random notes from her friends telling her that they suspected that her account had been hacked, but everything looked fine. Then, the cybercriminal opened a chat to me from her account typing, "... still stuck in London." Since, at that very moment, Debbie was standing next to me, it was pretty obvious we had a problem.