Did you ever wonder how Guccifer was able to hack high security networks and actually post revealing documents online? Did you ever wonder how hackers were able to break into computers without even kn...
What do you think of when you hear the words “cybersecurity” or “hacking?” Does it invoke an image of a nerdy (but evil) man hidden in the shadows with a computer stealing your personal data? It’s pos...
Printers are one of the most commonly used computer peripherals essential to every home and office. But, did you know that these devices are also designed to sell you out? Every piece of paper that co...
**This article contains mature/adult themes and topics and is may not be suitable for some readers. I am also absolutely not at all in any way condoning or promoting illegal activity of any kind. This...
The European Union made major strides in May when it passed regulations to protect citizens' online data, setting precedent for exactly what the United States should but still has not done.
Social med...
If your laptop has a camera, try saying hi to the person peeking through your webcam next time your computer is open.
OK, it’s more likely that no one actually hacked into your laptop camera, but rese...
Technology is all around us, and the amount of technology we have in our home is increasing everyday. Many of these new technologies have raised some questions about privacy. Whether it be Alexa or ou...
Last year, over 2 million Americans had their phones stolen. Phone thefts usually happen in public areas when your guard is down. Luckily, there are simple steps you can take to prevent this from happ...
The pervasion of mental spaces has increased dramatically over the last decade, particularly with the rise of social media. Most digital spaces have been sold and bought by corporations who push their...
Facebook is one of the most important social networking sites, allowing millions of subscribers to communicate fully with users on the Internet. There is no requirement to become a subscriber. Faceboo...
When we consider big data, the first question most people have is “how big does data have to be to be considered big data?” I think the best way to illustrate the potential size of big data is through...
The recent emphasis on data and analytics might make it seem like data a relatively new thing; however, data has driven human decisions since the dawn of time. Ever since we have been able to think an...
On October 1st, the world celebrated the International Day of Older Persons. This international day was initiated by the United Nations. It is estimated that there are almost 700 million people over t...
Thirtysomethings can still remember the days when Internet meant open, secure, and neutral space to share, search, and communicate. It promised democracy, equality, and knowledge. A decade or two ago,...
Cyber crimes and threats to online public information are on the rise. With hackers all around the world finding new ways of getting inside your personal online zone, the need for safer mechanisms and...
Social engineering is becoming one of the most popular methods used by cybercriminals for both big and small crimes. Essentially, social engineering is a way to gain access to networks, systems, or da...