By Greg Boyle There has been a lot of talk recently about future technology such as Google Glass and Apple iWatch, wearable tech is fast becoming a reality…it makes me wonderā¦is it all happening too fast? I worry about what the world will look like in five years time when my son reaches high school….
Read MoreBy Michael Miley I donāt know about you, but Iām one of those guys who likes the convenience and synergy of Comcastās XFINITY Triple Play service, because it provides phone, Internet, and TV access all wrapped up in a single package. (If it were cheaper, Iād like it even better!) Dealing with one company, rather…
Read More
The maturity of modern malware has given it more power to stay quiet and persistent, slowly stealing information.
Read More
The reliance on Skype for communication between friends, family, employees and even businesses has seen a notable amount of growth over the past many years, but there may be an endpoint security worry that many had not previously considered.
Read More
Customization has been a primary focus for new technology innovation in recent years, but on the wrong side of the Internet security continuum, it may prove to be extremely dangerous.
Read More
There is now greater reliance on applications within businesses than ever, but many companies are still looking for stronger data security in apps before they start leaning on them more heavily in their operations.
Read MoreByĀ Tom Mason This message will self-destruct in five seconds. Thatās the premise behind SnapChat and is hailed as the new Instagram. The app currently sends over 1,000 pictures every second and hereās how it works: You take a picture and pick who you want to send it to. You then choose how long that picture…
Read More
The recent hack of The Associated Press’ Twitter account showed the true power and impact the website can have. After hackers took over the news organization’s account and reported that President Barack Obama was seriously injured, the S&P 500 briefly took a gigantic hit.
Read More
The key to data and Internet security moving forward is likely going to be sharing of information, but experts said the new plan on behalf of the U.S. Department of Homeland Security may need to go further, according to CSO.com.
Read More
The waters of cloud security remain relatively murky for some, as many third-party contractors get involved in the highly collaborative process. Infocomm Development Authority of Singapore to define a new scheme under the CSA Open Certification Framework and the Singapore Multi-Tier Cloud Security standard.
Read More