February 22, 2016

Last week, a judge ordered Apple to help the FBI unlock an iPhone used by one of the perpetrators in the San Bernardino mass shooting. Despite the gravity of the case, the tech giant refused the government’s request on the grounds that such an act would compromise the security of all its customers. “We feel we must speak up in the face of what we see as an overreach by the U.S. government,” said Apple CEO Tim Cook in a Continue reading

Continue reading...

June 25, 2015

Ownership of private property is one of the United States’ oldest economic principles. But like many other seemingly everlasting ideas, modern technology has enabled companies to put this concept to the test. For instance, a few years ago Keurig’s single-cup coffeemakers became a big hit with consumers. Rather than brew an entire pot of coffee, those in need of a jolt simply place a small pod of grounds into the machine and wait a few seconds for their drink to Continue reading

Continue reading...

April 15, 2015

From The New York Times

Growers and sellers in Colorado’s legal marijuana industry may only deal in cash, leading to major problems with banking and security.

http://nyti.ms/1zchdUI

 Questions:

  1. With cannabis legal in Colorado, why can’t banks deal with merchants?
  1. Is there a double standard merchants face in the cannabis industry?

From The New York Times

 

Continue reading...

February 26, 2015

The recent hacks of Sony and Home Depot show just how much damage data breaches can do to big businesses. But a company doesn’t have to be multinational in order to attract the eyes of hackers. In fact, experts estimate that 44 percent of small businesses have been the victims of cyber attacks. According to the National Small Business Administration, each breach costs companies an average of $8,700 in damages.

“Cybercrime is in the news all the time, but there’s Continue reading

Continue reading...

December 2, 2014

With companies both large and small becoming increasingly dependent on technology, it’s important for these firms to make sure that their information is secure. But businesses need to do more than simply install anti-hacking software and hope their defenses hold. For instance, earlier this year Home Depot faced two small security breaches before getting hit with a company-wide hack that made national news. Following the minor incidents, security contractors urged executives to implement a few unused features in the anti-hacking Continue reading

Continue reading...

Net neutrality continues to be a hot topic for debate in Washington. Here’s a video explaining this complicated subject.

 

http://nyti.ms/1nRVU8i

Questions:

  1. Should the Federal Communications Commission (FDC) continue a policy of net neutrality?
  1. Does FCC Chairman Wheeler have a conflict of interest in this decision?

From The New York Times

 

Continue reading...

 

Most state laws designate marijuana as a Schedule I narcotic that is illegal to possess, sell or consume, barring medical reasons in some states. But last year voters in Colorado and Washington elected to legalize the drug following years of lax medical cannabis legislation. While Washington lawmakers are spending a year drafting regulations for retail sale, Colorado’s legal dispensaries opened to customers aged 21 and over on January 1, 2014. Nevertheless, the Rocky Mountain State’s marijuana growers have a Continue reading

Continue reading...

Like all coveted consumer items, smartphones are a prime target for theft. As the devices have become increasingly common, so have reports of muggings and break-ins involving the gadgets. According to Consumer Reports, more than 1.6 million Americans had their smartphones stolen in 2012. Meanwhile, smartphone thefts accounted for more than 50 percent of robberies in San Francisco and 75 percent of thefts in the neighboring city of Oakland.

The uptick in gadget-related larceny has led to an outcry among Continue reading

Continue reading...

 

Smartphones have granted people unprecedented access to information, but many users don’t realize they’re giving away just as much access to themselves simply by using the devices. As we’ve previously discussed, retailers and search engines compile loads of data gathered from users’ browsing habits. And if these legitimate operations can easily obtain this info, then it stands to reason that people with more nefarious intentions can find a way into your data as well.

However, many hackers these days Continue reading

Continue reading...