Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » PERSONAL SECURITY » Communications

Main mobile devices carriers agree to fight theft.

Main mobile devices carriers agree to fight theft.

With many U.S. states considering various mandatory “kill-switch” laws for mobile devices, the wireless industry announced a voluntary commitment to include new anti-theft technology on phones starting in 2015. The…

How to secure a high profile meeting.

How to secure a high profile meeting.

Maintaining security and privacy for high profile meetings is vital whether it is a shareholder meeting, political fundraiser or internal executive meeting. When off-the-cuff comments made by Mitt Romney at…

Guide of Emergency Management & Preventive Actions for free, can be downloaded.

Guide of Emergency Management & Preventive Actions for free, can be downloaded.

No one is ever ready for an emergency but you can be prepared. When you know where to get information, have the right supplies, and have a plan for you,…

U.S. Cyber Army is a fact, being fully operative in late 2012.

U.S. Cyber Army is a fact, being fully operative in late 2012.

The U.S. government is spending about $500 million on “cyber technologies” to fight back. A portion of this is set aside for a virtual firing range of sorts to test…

FBI Warns: Cyberwar Same Impact as Well-Placed Terrorist Bomb

FBI Warns: Cyberwar Same Impact as Well-Placed Terrorist Bomb

NATO and America’s European allies are sounding the alarm over what they say are increased cyber attacks originating from China that are targeting key government and intelligence computers. The warning…

Analysis: How to avoid Identity Theft

Analysis: How to avoid Identity Theft

 Identity theft is not just an unauthorized charge on a credit card anymore. Identity theft, according to the Federal Trade Commission, “occurs when someone uses your personally identifying information, like…