Internet

Cyber MAD: Are We In A New Cold War With China?

The classic 1964 film “Dr. Strangelove or: How I learned to Stop Worrying and Love the Bomb,” parodied the Cold War between the U.S. and the Soviet Union, and in particular, made fun of the “deterrence” military strategy—the strategy that we all must hope governs the use or lack thereof of nuclear arsenals. Nah-nah, nah…

[ Read More ]

Big Tech Now In Big Trouble With New GDPR Laws

America prides itself on being innovative, industrious, and independent—all commendable attributes. Until, as with any polarity, they swing too far in one direction. This appears to be the case when it comes to being slow on the uptake in regulating consumer privacy and data protection on the internet. Today’s commercial practices have grown over the

[ Read More ]

Death And Passwords: When You Don’t Have A Digital Estate Plan

Estate planning is about setting your affairs in order, making your final wishes known—and from an execution perspective, making it easier for your family to settle obligations and distribute your possessions after you’re gone. Sure, a lot of people don’t like to think, let alone talk, about the possibility of an untimely death, but the

[ Read More ]

Is The Backlash Of China’s Relentless Cyberwar Crippling America?

Times sure have changed.  It used to be, if you were interested in politics, you went into politics—maybe built up credentials in foreign affairs or law. And if you liked technology, you went into science, computer science, or some related discipline. But those idyllic days of relative separation are long gone. Now, we inhabit a

[ Read More ]

Why Cryptocurrency’s Future Needs More Women Behind The Scenes

Although recent gains within the realm of digital currencies like Ether and Bitcoin have generated considerable wealth for savvy investors, this landscape of beneficiaries is not particularly diverse in gender. In fact, most estimates suggest female participation in crypto—from adoption, to investment, to general use—only hovers somewhere around​ one to five percent.​ This reality stems

[ Read More ]

STIX And TAXII: Know How To Speak The Innovative Language

Drop the terms “STIX” and “TAXII” into general conversation at the dinner table, and it’s likely the kids will think you’re talking about a nature project, while the adults will be ordering you an Uber home to sleep it off. But in a different environment—say, across a boardroom table of IT executives or cybersecurity specialists,

[ Read More ]

The Revealing Truth About The Poor Security Of IP Targeting

An Internet Protocol (IP) address is like a digital passport to the wonderful world of the web. Right now, this post is being written from this location on the internet: 2605:6000:e9c4:b700:304a:2f6c:23bc:3333. It’s not just a virtual address—it’s also tied to my specific physical geographical location. That is, unless I’m using a VPN. Can you figure

[ Read More ]

Searching For Privacy: Is Google Its Own Worst Enemy?

On October 26, Google announced it would give more data security control back to its users, as they will now be able to review and delete their recent Search activity, as well as allowing them to learn more about Google Search works with their own data. In the coming weeks, these options will be available from

[ Read More ]

Sex, Work, And Malware: How To Avoid These Virtual STDs

Despite their devilish tactics, you have to give it hackers—they sure are creative at coming up with new and unexpected way to infiltrate your privacy and infect your systems with malware. Everyone knows the best kinds of hacks involve reverse engineering of the human mind, where a certain behavior can open up a world of

[ Read More ]

Stolen Facebook Accounts Now For Sale On The Dark Web

It no secret that Facebook recently experienced a major breach in security, leading to the compromise of over 30 million user accounts. Folks who were affected by the massive snafu not only had to clean the cobwebs out of their Facebook account, they also had to cope with unauthorized logins to a number of other

[ Read More ]