According to The Ponemon Institute, 55 percent of small businesses experienced at least one data breach in 2012 and 53 percent had multiple breaches.
Are you interested to learn about the delicate hacks and tricks that go on behind the curtains of the scene better known as the console hacking scene?
Just four days ago, National Security Agency-leaker Edward Snowden issued a rare statement, forcefully arguing against the American government’s line that what it does is not surveillance.
Motorola has announced a free, open hardware platform for smartphones called “Project Ara.” The goal is to create a modular smartphone that would allow users to swap hardware components at will.
The Syrian Electronic Army has been up to its old tricks again, this time claiming to have infiltrated president Barack Obama’s official Twitter and Facebook accounts, and re-election web site.
A few years back Google got into fearful trouble by recording the location of WiFi transceivers without asking for their owners’ permission.
The Internet Archive, the online repository of millions of digitized books, wants to shield its readers from other’s prying eyes — like the government’s.
The discrepancy, or gap, between doing and achieving is a persistent problem in business. Although every experienced leader knows that functional success
It’s fascinating how the mobile industry is shaping every single interaction we have with our friends, family and even colleagues and clients at work.
The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information.