Christmas Gifts, New Gadgets Can Compromise Your Online Security, Safety
by Lee Rickwood
Yes, even Christmas lights themselves – accessed through a connected smartphone and mobile app – can compromise your online safety, security and privacy.
by Lee Rickwood
Yes, even Christmas lights themselves – accessed through a connected smartphone and mobile app – can compromise your online safety, security and privacy.
by Lee Rickwood
goTenna Mesh works independently, and you do not need the usual wireless network services. It generates its own independent long-range radio waves, and that means users have a private and a secure way to communicate.
By Christine Persaud
We’ve moved well beyond the simple password and PIN for security of our electronic devices. And nowhere does that hold as true as when it comes to your phone.
by Lee Rickwood
The processing power of the cloud allows for predictive prevention, in which collected data and powerful algorithms are combined to the predict places and times where crimes are most likely to occur.
by Lee Rickwood
As powerful and capable as customized mobile safety apps can be, it is surely a matter of culture and attitude as much as infrastructure and technology that must be changed if there’s any hope of reducing and eliminating sexual assault and violence on campus.
by Lee Rickwood
Big data breaches are not just about big companies: small- and medium-sized businesses (SMBs) are clearly vulnerable, and the confidentiality, accuracy and availability of their data assets always at risk.
by Lee Rickwood
The suspension of an inquiry into the use of cell phone sniffers serves only to avoid the real issues of accountability and transparency about ownership, use or access to surveillance devices by provincial and national police forces.
by Lee Rickwood
Conservation, even techno-enabled conservation, is not easy. But technology can be used in the fight against illegal animal poaching and the exploitation of endangered species.