Search

Results 1-7 of 7 for Sam Bocetta.
OPINION

Some Android Malware Can Break Your Phone When You Delete It

If you're worried that your current Android device might be infected with malware, there are certain tell-tale signs to look for.

OPINION

Bridging the IoT Innovation-Security Gap

There is a problem with the Internet of Things: It's incredibly insecure. This is not a problem that is inherent to the idea of smart devices. Wearables, smart houses, and fitness tracking apps can be made secure -- or at least more secure than they currently are. The problem, instead, is one that l...

OPINION

Is Congress Finally Ready to Take On Cybersecurity?

The United States Congress made some significant progress this session when it comes to data privacy, but cybersecurity remains a blind spot for lawmakers. Congress currently is considering a national privacy law that mirrors legislation enacted in the European Union. It would allow people to access...

OPINION

Is Your Health Data at Risk?

We've recently seen much breathless news coverage of the Nightingale Project, Google's half-secret partnership with Ascension, the second-largest healthcare system in the United States. The details of the project -- which involves sharing the healthcare data of tens of millions of unsuspecting patie...

OPINION

How the Quantum Tech Race Puts the World’s Data at Risk

The technology one-upmanship between the United States and China is fast becoming the new space race. There's been a lot of talk in the press about the competition to reach 5G, but little traction outside of the tech community about something more momentous: the dangers of computing in a post-quantu...

OPINION

Are You Suffering From Technophobia?

The fear of technology has been around for as long as technology itself, and like technology itself, this fear is always changing. There is evidence of "technophobia" -- the technical name for this affliction -- in every age and in every part of the world. However, it is perhaps reaching a peak in m...

OPINION

Setting Up Roadblocks to Social Engineering

Since the dawn of the Internet age, criminals have looked for ways to profit on unsuspecting people while they browse the Web. Viruses, malware and other schemes were invented to infect and infiltrate systems, both at the enterprise and consumer levels. One of the most successful forms of cybercrime...

Technewsworld Channels