Search Results

Results 1-7 of 7 for Sam Bocetta
OPINION

Some Android Malware Can Break Your Phone When You Delete It

Since Android's unveiling in 2007, the platform has stayed true to its commitment to provide open and free source code. The source code is freely available to developers and device manufacturers who can, at their own discretion, install the software without worrying about the hassles of licensing fees. ...

OPINION

Bridging the IoT Innovation-Security Gap

There is a problem with the Internet of Things: It's incredibly insecure ...

OPINION

Is Congress Finally Ready to Take On Cybersecurity?

The United States Congress made some significant progress this session when it comes to data privacy, but cybersecurity remains a blind spot for lawmakers. ...

OPINION

Is Your Health Data at Risk?

We've recently seen much breathless news coverage of the Nightingale Project, Google's half-secret partnership with Ascension, the second-largest healthcare system in the United States. ...

OPINION

How the Quantum Tech Race Puts the World’s Data at Risk

The technology one-upmanship between the United States and China is fast becoming the new space race. There's been a lot of talk in the press about the competition to reach 5G, but little traction outside of the tech community about something more momentous: the dangers of computing in a post-quantum world ...

OPINION

Are You Suffering From Technophobia?

The fear of technology has been around for as long as technology itself, and like technology itself, this fear is always changing ...

OPINION

Setting Up Roadblocks to Social Engineering

Since the dawn of the Internet age, criminals have looked for ways to profit on unsuspecting people while they browse the Web. Viruses, malware and other schemes were invented to infect and infiltrate systems, both at the enterprise and consumer levels. One of the most successful forms of cybercrime is social engineering, also known as the con man of the Internet...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

LinuxInsider Channels