In a world of increasingly sophisticated facial-recognition technology, a drastic technique can throw the machines off your trail.
Groups says it all boils down to an IT management issue.
New Need to Know Memo explores the implications of cloud computing, data center consolidation, virtualization, remote access and infrastructure diversification.
Crooks used logins stolen from earlier breaches at other companies.
If you use an iPhone or iPad, your photos, web history, and GPS logs are vulnerable to theft and surveillance via back-door protocols running on all iOS devices.
Medical professionals say the device could be helpful, but patient privacy is still a concern.
Robert McDonald says he's already met with Defense Secretary Chuck Hagel to discuss electronic health records.
A newly disclosed government rule book reveals just how easy it is to get placed on a terrorist watch list—and how difficult it can be to get taken off.