Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.
Microsoft CEO Satya Nadella renewed his company’s call for privacy on a global basis at the World Economic Forum in Davos, Switzerland. Speaking during an on-stage interview on Jan. 24, Nadella said that he sees privacy as a basic human right. He also said that he hopes the United States can adopt privacy laws similar […]
We’ve been hearing stories about airborne deliveries by autonomous drones for a few years now. The Amazon drone is already a staple of technology stories. But it looks like another drone-like delivery method might end up being the one that is actually used. It’s the delivery drone that Amazon has just announced, called the Amazon […]
European regulators have fined Google and its parent company Alphabet €50 million in response to a complaint filed on May 25, 2018 saying that Google failed to meet the requirements of the GDPR in regard to its privacy practices. In this case, the complaint was in regard to the company’s Android mobile software, and it […]
As you read this, there’s a virtual certainty that nation-state actors who intend to harm the United States have already invaded critical networks and computing facilities. Those same actors may have begun downloaded secure databases, they may be traversing networks looking for classified information, and they may be laying traps for federal workers when they […]
Everybody does it. You do it. It’s the easy way out, but it’s also an easy way to a security blunder. The “it” in this case is using your email address as your user name for websites and other places where a login is necessary. Chances are you use one of a couple email addresses […]
When I wrote about avoiding the Ryuk ransomware a few days ago, one of the characteristics new to most IT professionals was the idea that the attack would be managed in person by a cyber-attacker. Normally when we think of malware, including ransomware, we think of it spreading using the old computer virus model. But […]
The idea behind the use of quantum computers to break encryption lies in the fact that the encryption keys used by current encryption methods depend on a secret key that is used to encrypt and decrypt the information that’s being protected. Those keys are long, random—or, more likely, almost random—numbers that are shared between the […]
For federal cyber-security workers, the options at this time are bleak. A few are being told that they’re required to continue to work during the current government shutdown that began on Dec. 21, 2018, but they won’t be paid for that work until the government resumes operation and maybe not even then. Meanwhile, the majority […]
After years of contention about real and imagined security attacks on U.S. elections, the U.S. House of Representatives is expected to consider and then pass H.R. 1, also known as the “For the People Act of 2019,” which includes provisions that would improve election security and help states improve their voting systems, as well as […]
At the end of December 2018, security researchers in Leipzig, Germany, demonstrated at a security conference their method of hacking a biometric security system that depends on reading the pattern of blood vessels in the palm of the hand. This method of vein authentication involves reading the details of the veins just below the skin […]