Cyber scaremongering isn't working claim small businesses
Stop talking about cyber security and start talking about digital business risk…that's the message coming over loud and clear from the small business industry.
Stop talking about cyber security and start talking about digital business risk…that's the message coming over loud and clear from the small business industry.
Internet
May 30, 2013
0
0
For decades we've been watching TV. Now a new generation of televisions is beginning to watch us. Technological advances are giving the old clunky "boob tube" an IQ injection. Some of the new breed of smart TVs comes equipped ...
Telecom
May 28, 2013
0
0
Many of us are sharing increasing amounts of personal information through online social media sites, including Facebook, Twitter, LinkedIn and others. However, according to Charlott Lorentzen, Markus Fiedler and Henric Johnson ...
Internet
Apr 26, 2013
0
0
(Phys.org) —Hackers at a please-hack-me contest at the CanWest security conference in Vancouver, BC, went home empty-handed. The contest during the Vancouver three-day conference on digital security ended up with enlightened ...
Hitachi, Ltd. recently announced the development of provably secure digital signature technology based on the use of biometric information such as finger vein pattern in creating the signature. Through this, it will be possible ...
Engineering
Feb 26, 2013
0
0
Japanese police on Sunday arrested a man suspected of being behind a computer hacking campaign following an exhaustive hunt that at one stage had authorities tracking down a cat for clues, according to reports.
Internet
Feb 10, 2013
2
0
China on Thursday dismissed accusations that it had hacked into the system of the New York Times, in a cyberattack the paper linked to its expose of the wealth amassed by the family of Premier Wen Jiabao.
Internet
Jan 31, 2013
0
0
(Phys.org)—A digital video recorder (DVR), used in homes and businesses for security, is helpful when not in the hands of criminals, The latter scenario is what is rattling some security blog and Forbes readers, with the ...
The smartphone is evolving from a communications and computing device to a command center and control panel for a wide range of other devices.
Consumer & Gadgets
Jan 13, 2013
0
0
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global ...
Internet
Nov 14, 2012
0
0