DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa!

DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa!

DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa! We have a problem with illegal immigrants.  Now don’t get me wrong we love immigrants and they can add a lot to our economy but those immigrants come to our country through...
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.

Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.

Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Do You Use Trello? Search turns up massive trove of private data

Do You Use Trello? Search turns up massive trove of private data

Do You Use Trello? Search turns up massive trove of private data Do you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration.    However, it must get set up correctly if you want to...
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...

A Lesson to Learn – If it is Connected It can Be Hacked

A Lesson to Learn – If it is Connected It can Be Hacked I remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...