In Europe, there’s a lot of discussion about whether or not citizens have the right to be forgotten, or rather, be forgotten by search engines. According to a May 2014 ruling, search engines must consider requests from the public for removal of content. Not just...
In 2014 Community Health Systems, a huge hospital network, became the victim of a Chinese hacker group. The data breach occurred in 206 facilities across the U.S. and involved 4.5 million records, including Social Security numbers, birthdays, names, addresses. Nobody...
Microsoft and Apple have been competitors and the leaders of personal computing since the 1970s. The competition has at times created uneasy alliances and outright hostility between the two companies. The results of this have been the creation of hardware and software...
USB devices are a widely used item in the world of technology. Unfortunately they are notoriously vulnerable to exploitation by hackers and malware. As malware grows more and more sophisticated, you can no longer trust simple antivirus scans to protect your business....
Apple’s iOS operating system is known for its impressive security features, but that doesn’t mean it is invulnerable to all threats. Backdoors have been located in the operating system allowing Apple and law enforcement agencies like the NSA to access the...