Five keys to small business cyber safety

According to The Ponemon Institute, 55 percent of small businesses experienced at least one data breach in 2012 and 53 percent had multiple breaches.
A primer on breaking game console security

Are you interested to learn about the delicate hacks and tricks that go on behind the curtains of the scene better known as the console hacking scene?
Senator changes tune, now is “totally opposed” to foreign leader surveillance

Just four days ago, National Security Agency-leaker Edward Snowden issued a rare statement, forcefully arguing against the American government’s line that what it does is not surveillance.
Motorola Announces “Project Ara,” a modular phone hardware platform

Motorola has announced a free, open hardware platform for smartphones called “Project Ara.” The goal is to create a modular smartphone that would allow users to swap hardware components at will.
Syrian Electronic Army claims Obama social media hijacking

The Syrian Electronic Army has been up to its old tricks again, this time claiming to have infiltrated president Barack Obama’s official Twitter and Facebook accounts, and re-election web site.
Mozilla goes where Google fears to tread with geolocation service

A few years back Google got into fearful trouble by recording the location of WiFi transceivers without asking for their owners’ permission.
Internet Archive, fearful of spying, boosts its encryption

The Internet Archive, the online repository of millions of digitized books, wants to shield its readers from other’s prying eyes — like the government’s.
The Machiavellian CIO: Morality versus reality

The discrepancy, or gap, between doing and achieving is a persistent problem in business. Although every experienced leader knows that functional success
India biz should tap external customers via mobile apps

It’s fascinating how the mobile industry is shaping every single interaction we have with our friends, family and even colleagues and clients at work.
Traditional security models becoming exhausted

The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information.