I Have Trust Issues With Tech Companies In light of the recent LinkedIn acquisition by Microsoft, I started to think (worry) about the current line-up of top tech companies. All of them collect, use and “sell” our data in varying degrees. Some are sneaky about it while others are bolder and more upfront. Some shy… Read More »
Top Security Features Apple Announced at WWDC
Top Security Features Apple Announced at WWDC Amidst hundreds of new iOS, watchOS, tvOS and macOS features announced, it was the security ones that told Apple’s story best to me. Apple’s narrative as the security and privacy-focused company continues to solidify. In the same way that Google cannot suddenly stop tracking our search and email… Read More »
Microsoft’s Big Data Bet On LinkedIn
Microsoft’s Big Data Bet On LinkedIn As a business owner and premium LinkedIn account holder, I value the focused data details they deliver on all of my connections. LinkedIn has always felt like the Facebook of the business world to me and since I don’t personally use Facebook, that makes LinkedIn all the more important to… Read More »
Google’s Big Encryption Gamble
Google’s Big Encryption Gamble Of the many recent Google I/O announcements made, a few stood out to this cybersecurity expert. Google announced a new video chat app, a messaging app, and smart home appliance called Duo, Allo and Google Home respectively. All these products are due out this summer and promise to deliver outstanding AI-based… Read More »
Apple’s iPhone Encryption Security Battle is Canary in IoT Coal Mine
Are we doomed to repeat the mistakes of the past? With a little luck, we are. I know that sounds rather pessimistic but in light of the current FBI and Apple battle over encryption security, we are standing at a familiar crossroads. Last time, the U.S. avoided widespread security failure was the ill-proposed Clipper Chip… Read More »
In IoT, More Things = Less Security
With the incremental efficiencies we gain with each new technology, there is also incremental potential for hackers to exploit the newfound vulnerabilities introduced. Fortunately, as the Internet of Things (IoT) advances, so does the knowledge of the many vulnerabilities discovered – many of which are hopefully remedied before they make hacking headlines. So what IoT… Read More »
Feds Want Front and Backdoors To Encryption In Every iPhone
When FBI director was first asked if he had any intentions to force Apple to unlock more than the single iPhone 5C in question, he answered “unlikely to be a trailblazer” for setting a precedent for other cases. But a week later when asked before a congressional panel under oath, he said the judgement on this single iPhone would… Read More »
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 7
- Next Page »