January 25, 2018
Data Breaches and Identity Theft: The Epidemic Worsens
From January 1, 2005 to December 27, 2017, the Identity Theft Resource Center (ITRC) reported…
January 16, 2018
Developers Flock to Artificial Intelligence and Machine Learning
Millions of developers are using Artificial Intelligence (AI) or Machine Learning (ML) in their projects,…
January 9, 2018
Wireless Wi-Fi Networks to Become More Secure with WPA3
Wireless Ethernet connections aren’t necessarily secure. The authentication methods used to permit access between a…
January 2, 2018
The Next Tech Revolution Will Be Speech-Driven
Amazon says that that a cloud-connected speaker/microphone was at the top of the charts: “This…
December 26, 2017
Malware Can Damage Hardware — Intentionally and Accidentally
Software can affect the performance of hardware, and under the right (or wrong) circumstances, malware…
December 20, 2017
Watch Out for the Man in the Middle
Man-in-the-Middle (MITM or MitM) attacks are about to become famous, in the way that ransomware,…
December 13, 2017
Call It Scrum 1.5: An Update to the Most Flexible Agile Process
Agility – the ability to deliver projects quickly. That applies to new projects, as well…
December 7, 2017
Payment processors and point-of-sale are opportunities for hackers
Criminals like to steal money from banks. Nothing new there: As Willie Sutton famously said,…
November 30, 2017
You’ve Got 30 Seconds to Satisfy the Mobile App Customer
Thirty seconds. That’s about how long a mobile user will spend with your game or other…