Regrettable circumstances have found me recently visiting various local medical offices, and have once again led me to question the security of my private medical and financial information. While most people turn a blind eye to how patient records are handled by their...
As you may recall, last week the Yahoo email account of Republican vice-presidential candidate Sarah Palin was hacked. Stolen private emails and photographs of her children were then posted to numerous websites. Also stolen was the cell phone number of Palin’s...
Late Tuesday night or early Wednesday morning, the Yahoo email account of Alaska Governor and Republican vice-presidential candidate Sarah Palin was hacked. Stolen private emails and photographs of her children were then posted to numerous websites. Also stolen was...
“Computers are useless. They only give you answers;” so said acclaimed artist Pablo Picasso in the late 1960s. Forty years later, computers have evolved into useful tools capable of performing an amazing array of tasks, even though they are still incapable of...
A few weeks ago, while I was at the Defcon computer security conference in Las Vegas, I attended a panel discussion on The Commission on Cybersecurity for the 44th Presidency. Established by The Center for Strategic and International Studies, the Commission will make...
Page 3 of 9«12345...»Last »