CloudAlloy’s New Move for Better Cloud Security

CloudAlloy’s New Move for Better Cloud Security

03 September 2014

CloudAlloy is planning to make security a little easier when it comes to the cloud. How? By breaking up documents stored within into several different pieces. Despite the many benefits that cloud technology brings with it, none of us can ignore the security flaws that are at play. A New Hope Many companies have traditionally [...]

Read the full story

Posted in UncategorizedComments (0)

What Can Be Done about Facebook Tracking

What Can Be Done about Facebook Tracking

01 September 2014

Facebook has attracted the wrath of technology pundits for their controversial privacy policies on more than one occasion. Using their massive consumer appeal to their advantage the social networking giant has frequently drafted terms of use that suit their business model and often overlooks their user’ privacy. The company’s creepy new digital tracking initiative is [...]

Read the full story

Posted in UncategorizedComments (0)

NSA’s Computer & Mobile Spying: An Interview with Tung Yin

NSA’s Computer & Mobile Spying: An Interview with Tung Yin

26 November 2013

Tung Yin is a professor of law at Lewis & Clark Law School in Portland, Oregon. His main area of focus is national security law, criminal procedure, terrorism and law, and federal criminal law. He has conducted extensive research on domestic legal problems that were borne from counter-terrorism practices and policies in the aftermath of [...]

Read the full story

Posted in UncategorizedComments (0)

NSA: From Security Provider To Cell Phone Tracker

NSA: From Security Provider To Cell Phone Tracker

21 August 2013

Cell phone tracker and spy software have been traditionally associated with hackers, malware, Trojans and what not. However, in light of the NSA blowout we’re now finding that tracking is something even the government is involved in. According to reports the National Security Agency (NSA) has been spying on US citizens all in the name [...]

Read the full story

Posted in InfographicsComments (0)

The ultimate keylogger: FBI’s Magic Lantern

The ultimate keylogger: FBI’s Magic Lantern

19 July 2013

While keyloggers maybe popularly associated with hackers and identity thieves in the digital realm, they have one more master that we often overlook i.e. the FBI. The Magic Lantern was a special program which used tricks only known to black hat hackers. It infiltrates a target’s system and steals all kinds of data. This infographic [...]

Read the full story

Posted in InfographicsComments (0)

Dissecting Cyberbullying: An Interview with Dr. Justin W. Patchin

Dissecting Cyberbullying: An Interview with Dr. Justin W. Patchin

26 April 2013

Cyberbullying is a significant problem that can be stopped in its tracks if the right kind of actions are taken at the right time. It is a form of violence where the perpetrator doesn’t realize the magnitude of the damage they’re doing, and the victim has troubling finding their voice to speak against it. Cyberbullying [...]

Read the full story

Posted in UncategorizedComments (0)

Alarming Facebook Misuse Stats

Alarming Facebook Misuse Stats

23 April 2013

Facebook is booming and business has never been better for the social media giant. However, it’s proliferation in the last few years has resulted in some unintended and unwanted consequences. The alarming numbers on Facebook are on the rise and further climbing. Be it a teen or an employee – effort is needed to ensure [...]

Read the full story

Posted in InfographicsComments (0)

Text Messaging Habits We All Hate

Text Messaging Habits We All Hate

14 March 2013

All of us know at least one person who sends long boring text messages; a couple that refuses to stop texting no matter who’s around; people who respond after ages with a “K”; then there are those that text you absolute gibberish because they’re “too cool for school”; and of course anger management cases that [...]

Read the full story

Posted in InfographicsComments (0)

1 3 4 5 6 7 16