Tags » privacy

Next »
Posts
after tinder
What Comes After Tinder? By March 17, 2017 1:15 pm  More)
student privacy
Report: Tech Companies Are Spying on Children Through Devices and Software Used in Classroom By More)
against government hackers
How to defend against government hackers By Mark Rockwell Mar 31, 2017 https://fcw.com/articles/2017/03/31/rule41-aclu-defense-cyber.aspx The 18 (More)
Social Media and Social Credit: Should we use it less?
Do you wonder what data is being collected about you and why? Do you think it is merely to get you to  buy stuff? It might not be that simple..... Have you heard of the concept of social credit? Essentially, it refers to a score, like a credit sco (More)
CIA hacks
WikiLeaks: Here's how the CIA hacks your phones, TVs and PCs The organization released thousands of documents it claims show how the US spy agency can crack open devices from Apple, Samsung, Google and Microsoft. More)
cybersecurity grants
Grant program would support state, local cybersecurity By Mark Rockwell Mar 02, 2017 https://fcw.com/articles/2017/03/02/state-cyber-bill-rockwell.aspx < (More)
cyberwarfare
How to define cyber-enabled economic warfare By Sean D. Carberry Feb 23, 2017 https://fcw.com/articles/2017/02/23/critical-ceew-cyber-carbery.aspx (More)
confide app
White House staffers are using this self-destructing messages app to gossip in private — here’s how it works Kif Leswig http://www.businessinsider.com/confide-me (More)
tech in China
The uncomfortable truth about tech in China By Steve Kelman https://fcw.com/blogs/lectern/2017/02/kelman-china-innovation.aspx Only recently, the gener (More)
FBI can hack computers
This rule basically gives the FBI power to hack anyone https://www.facebook.com/NowThisFuture/videos/1249249875165134/ Last-ditch effort to prevent change (More)
Next »
Skip to toolbar