December 2, 2014

With companies both large and small becoming increasingly dependent on technology, it’s important for these firms to make sure that their information is secure. But businesses need to do more than simply install anti-hacking software and hope their defenses hold. For instance, earlier this year Home Depot faced two small security breaches before getting hit with a company-wide hack that made national news. Following the minor incidents, security contractors urged executives to implement a few unused features in the anti-hacking Continue reading

Continue reading...

 

Most state laws designate marijuana as a Schedule I narcotic that is illegal to possess, sell or consume, barring medical reasons in some states. But last year voters in Colorado and Washington elected to legalize the drug following years of lax medical cannabis legislation. While Washington lawmakers are spending a year drafting regulations for retail sale, Colorado’s legal dispensaries opened to customers aged 21 and over on January 1, 2014. Nevertheless, the Rocky Mountain State’s marijuana growers have a Continue reading

Continue reading...

Like all coveted consumer items, smartphones are a prime target for theft. As the devices have become increasingly common, so have reports of muggings and break-ins involving the gadgets. According to Consumer Reports, more than 1.6 million Americans had their smartphones stolen in 2012. Meanwhile, smartphone thefts accounted for more than 50 percent of robberies in San Francisco and 75 percent of thefts in the neighboring city of Oakland.

The uptick in gadget-related larceny has led to an outcry among Continue reading

Continue reading...

 

Smartphones have granted people unprecedented access to information, but many users don’t realize they’re giving away just as much access to themselves simply by using the devices. As we’ve previously discussed, retailers and search engines compile loads of data gathered from users’ browsing habits. And if these legitimate operations can easily obtain this info, then it stands to reason that people with more nefarious intentions can find a way into your data as well.

However, many hackers these days Continue reading

Continue reading...

In this video the Treasury Department details all the design changes soon to be implemented on the $100 bill.

https://www.newmoney.gov/uscurrency/redesigned100.htm

Questions:

  1. Why did the Federal Reserve take almost 10 years to develop a new $100 bill?
  1. What other considerations needed to be considered in the new $100 bill?

 

From U.S. Currency

 

Continue reading...