Tag: Mobile

T

These Are 10 Cybersecurity Myths That Must Be Busted

Cybersecurity was huge in 2016. From ransomware to weaponized Internet of Things (IoT) devices to foreign hacking of elections – last year saw it all. But many of these threats aren’t new and will never really go away. Over the last 25 years, one of the most valuable things I’ve learned in attending conferences and talking to cybersecurity experts around the world is that one of the greatest weapons we have to prevent cyber attacks is our own mindset. This column has previously touched on the importance of online hygiene and why you should think of your online activities like

W

What the communication revolution means for global leaders today

The theme of last year’s Davos, the Fourth Industrial Revolution, became the underlying force driving many of the unexpected developments we’ve seen in 2016. With the rapid and exponential growth of connectivity and networking predicted by Moore’s Law, the Fourth Industrial Revolution is disrupting many fields, but none more strikingly than democracy — and capitalism. Both institutions are based on the freedom to choose a leader, product or service based on the best available information. But only now are we realizing the significance of how this information is created, delivered, modified and consumed — how it has been skewed by the exponential growth in

T

The Big Chill: Don’t Let Cybersecurity Threats Slow Productivity & Economic Growth

Trust is an essential underpinning of life in the digital age. We trust our friends on Facebook not to share our private family photos. We trust our email clients and antivirus software to keep viruses and spam at bay. But for many people, the risks of using the internet are scary enough to curb their online activities. Earlier this year, the U.S. Department of Commerce’s National Telecommunications & Information Administration (NTIA) looked at the results of a survey by the U.S. Census Bureau in 2015. Out of 41,000 U.S. households, 19% reported security breaches, identity theft, or other malicious activity

W

What the G7 must do for internet growth and security

In 2014, researchers from the World Economic Forum and McKinsey & Company projected that as much as $21 trillion in global economic value creation would depend on the robustness of cyber-security over five to seven years. That’s as big as the entire U.S. economy. To discuss the future of the Internet and its risks, IT ministers from the G7 countries and the EU gathered for the first time in 20 years. The information and communications technology (ICT) summit in Takamatsu, Japan, was held against a background of major cyber-security dangers including threats to critical infrastructure and mobile devices as well

F

Foxconn’s Deal for Sharp Now in Question Taiwanese assembler of iPhones said it is delaying the signing of takeover agreement

Author: Eva Dou in Beijing, Wayne Ma in Hong Kong and Takashi Mochizuki in Tokyo Originally posted: The Wall Street Journal Board members of struggling Japanese electronics maker Sharp Corp. met Thursday and agreed to sell the company to Taiwan’s Foxconn Technology Group for almost $6 billion, a decision hailed as a symbol of a push by Japan’s government to open up the country’s notoriously insular industries. There was a snag. Foxconn, which assembles most of Apple Inc.’s iPhones, was having second thoughts. In a written statement released hours later, Foxconn said it would delay signing any deal because it

Do NOT follow this link or you will be banned from the site!