February 25, 2013

Welcome to the Year of the Hack

John Herrman, BuzzFeed


AP Photo

"I think it is worse than ever," admits Wisniewski. "Our privacy is currency and our information is currency, and the criminals have figured that out." Criminals and, according to reports, the Chinese government, which would constitute a cyber-threat with an unprecedented combination of resources and motivation. In other words, it's not just a perfect storm. It's a perfect storm with no forecasted end.

Read Full Article ››

TAGGED: Privacy, Cyber War, Hacking

RECOMMENDED ARTICLES

October 19, 2013
Hidden Habits Your Car Is Sharing
Jon Stewart, BBC News
You wouldn’t think that anybody would care about your drive to the supermarket to buy milk. But in the burgeoning world of building and selling electric cars, knowing about people’s driving habits is invaluable to... more ››
October 19, 2013
Why the iPhone 5S Is Too Good
Antone Gonsalves, Computerworld
When it comes to technology and design in consumer electronics, Apple has few peers. But in trying to lead the way in smartphone technology with the iPhone 5s, the company's creativity has given us a reason to step back and... more ››
October 18, 2013
5 Things to Know About Facebook and Teen Privacy
Kristin Burnham, IW
Facebook is changing its privacy settings again, this time with a few new updates that impact its youngest users: 13- to 17-year-olds. According to Facebook, when new users in this age group sign up for an account, the initial... more ››
October 21, 2013
Credit Monitor Sold Data to Identity Thieves
Brian Krebs, On Security
An identity theft service that sold Social Security and drivers license numbers — as well as bank account and credit card data on millions of Americans — purchased much of its data from Experian, one of the three major credit... more ››
October 21, 2013
How Stores Track You Through Your Phone
Brian Fung, Washington Post
Every smartphone these days comes equipped with a WiFi card. When the card is on and looking for networks to join, it's detectable by local routers. In your home, the router connects to your device, and then voila — you have... more ››