~ C-D-A-V ~ Connected – Dependent – And – Vulnerable
~ P&P-IACW ~ Progress And Peril – In A Connected World
~ TWIF(AWO) ~ The World Is Flat (And Wide Open)
~ TGODOCC ~ The Good Old Days Of Cyber Crime
~ TME ~ The Malware Explosion
~ TSI ~ The Security Illusion
~ SC ~ System Crash
~ AVGIG ~ A Vulnerable Global Information Grid
~ MO ~ Moore’s Outlaws
~ TWOE ~ The World Of Exponentials
~ TCS ~ The Crime Singularity
~ CTC-CTW ~ Control The Code – Control The World
~ YNTC-YTP ~ You’re Not The Customer – You’re The Product
~ OGDW-WTNTY ~ Our Growing Digital World – What They Never Told You
~ TSNAII-Y ~ The Social Network And Its Inventory – You
~ YL-HTDI ~ You’re Leaking – How They Do It
~ TMETIlF ~ The Most Expensive Things In Life Are Free
~ TACA(AY)~ Terms And Conditions Apply (Against You)
~ MM ~ Mobile Me
~ PYD?-TAAFT ~ Pilfering Your Data? – There’s An App For That
~ L/L/L ~ Location / Location / Location
~ TSE ~ The Surveillance Economy
~ YTHWB?-MTDB ~ You Thought Hackers Were Bad? – Meet The Data Brokers
~ AY ~ Analyzing You
~ BIGNTH ~ But I’ve Got Nothing To Hide
~ PRAOUS ~ Privacy Risks And Other Unpleasant Surprises
~ OPVB ~ Opening Pandora’s Virtual Box
~ KIP-CIK-A-OWR ~ Knowledge Is Power – Code Is King – And – Orwell Was Right
~ BD-BR ~ Big Data – Big Risk
~ DITNO ~ Data Is The New Oil
~ BS-GV-OB? ~ Bad Stewards – Good Victims – Or Both?
~ DBAPSOYDT ~ Data Brokers Are Poor Stewards Of Your Data Too
~ SNI ~ Social Networking Ills
~ ID-TLOIT ~ Illicit Data – The Lifeblood Of Identity Theft
~ S-B-A-E-OM! ~ Stalkers – Bullies – And – Exes – Oh My!
~ OTTM ~ Online Threats To Minors
~ HGH ~ Haters Gonna Hate
~ B2.0 ~ Burglary 2.0
~ TS&TK ~ Targeted Scams And Targeted Killings
~ CIOLGD ~ Counterintelligence Implications Of Leaked Government Data
~ TSWLM ~ The Spy Who Liked Me
~ ITPH ~ I.T. Phones Home
~ MPOSI ~ Mobile Phone Operating System Insecurity
~ MTA ~ Mind The App
~ WDMFANATMC? ~ Why Does My Flashlight App Need Access To My Contacts?
~ MDANT ~ Mobile Device And Network Threats
~ HMP ~ Hacking Mobile Payments
~ YLBTSOTC ~ Your Location Becomes The Scene Of The Crime
~ CWA ~ Cloudy Weather Ahead
~ TDSOBD ~ The Darker Side Of Big Data
~ ISWT ~ In Screen We Trust
~ LIAMW ~ Life In A Mediated World
~ DNC ~ Does Not Compute
~ ITYWMF ~ I Thought You Were My Friend
~ FSE ~ Fatal System Error
~ WSAB ~ When Seeing Ain’t Believing
~ SOTC ~ Screen Of The Crime
~ SS ~ Stock Screeners
~ MS-MP ~ Mo’ Screens – Mo’ Problems
~ LIS-GPSH ~ Lost In Space – GPS Hacks
~ SP-HCI-F-FAM ~ Screen Play – Hacking Critical Infrastructure – For – Fun And Mayhem
~ CAD ~ Control – Alt – Deceit
~ TFOC ~ The Future Of Crime
~ TL(C)SU ~ The Lean (Criminal) Start-Up
~ ASMOC ~ A Sophisticated Matrix Of Crime
~ CU ~ Crime U
~ IFTU ~ Innovation From The Underworld
~ FCSTCS ~ From Crowdsourcing To Crime Sourcing
~ ITDU ~ Inside The Digital Underground
~ PTTDW ~ Passport To The Dark Web
~ AJITA ~ A Journey Into The Abyss
~ DC ~ Dark Coins
~ CAAS ~ Crime As A Service
~ C.C ~ Crimeazon.Com
~ TM-IC ~ The Malware-Industrial Complex
~ NOTLD-WBZA ~ Net Of The Living Dead – When Botnet Zombies Attack
~ CCA ~ Committing Crime Automagically
~ WATAH ~ When All Things Are Hackable
~ WTWTA ~ Where The Wireless Things Are
~ ITIOT ~ Imagining The Internet Of Things
~ CE-I ~ Connecting Everything – Insecurely
~ OP ~ Obliterating Privacy
~ HH ~ Hacking Hardware
~ MC-MV ~ More Connections – More Vulnerabilities
~ HHH ~ Home Hacked Home
~ FCTCH ~ From Carjacking To Car Hacking
~ WTOK ~ What The Outlet Knows
~ BA&BH ~ Business Attacks And Building Hacks
~ TSCOS ~ The Smart City Operating System
~ HY ~ Hacking You
~ MTMTE-TWOWC ~ More Than Meets The Eye – The World Of Wearable Computing
~ YBMH-TDOIC ~ You’re Breaking My Heart – The Dangers Of Implantable Computers
~ IC-HB ~ Identity Crisis – Hacking Biometrics
~ FC(AH) ~ Fingers Crossed (And Hacked)
~ YP?-IIWAOYF ~ Your Password? – It Is Written All Over Your Face
~ AR ~ Augmenting Reality
~ TROHV ~ The Rise Of Homo Virtualis
~ ROTM-WCCG3D ~ Rise Of The Machines – When Cyber Crime Goes 3-D
~ W-R ~ We – Robot
~ TMI(R) C ~ The Military-Industrial (Robotic) Complex
~ ARIEHAO ~ A Robot In Every Home And Office
~ HNNA ~ Humans Need Not Apply
~ R:R-L-E-A-P ~ Robot: Rights – Law – Ethics – And – Privacy
~ HR ~ Hacking Robots
~ GOD ~ Game Of Drones
~ RBB ~ Robots Behaving Badly
~ AOTD ~ Attack Of The Drones
~ TFORAAM ~ The Future Of Robotics And Autonomous Machines
~ PC ~ Printing Crime
~ NGST-WCWOTB ~ Next Generation Security Threats – Why Cyber Was Only The Beginning
~ NI ~ Nearly Intelligent
~ TTMA ~ Talk To My Agent
~ BBAATFOMN ~ Black-Box Algorithms And The Fallacy Of Math Neutrality
~ WWTTALOC ~ When Watson Turns To A Life Of Crime
~ AGI ~ Artificial General Intelligence
~ TIG-BCI ~ Tapping Into Genius – Brain-Computer Interface
~ MR-BW-A-NH ~ Mind Reading – Brain Warrants – And – Neuro-Hackers
~ BIIT ~ Biology Is Information Technology
~ BC&DNAHD ~ Bio-Computers And DNA Hard Drives
~ JPFR ~ Jurassic Park For Reals
~ IOTBS-GP-BE-&-DNAS ~ Invasion Of The Bio-Snatchers – Genetic Privacy – Bio-Ethics – And – DNA Stalkers
~ BC&NOFTM ~ Bio-Cartels And New Opiates For The Masses
~ HTSOL-BC&BT ~ Hacking The Software Of Life – Bio-Crime And Bio-Terrorism
~ TFF-S-NAQ ~ The Final Frontier – Space – Nano And Quantum
~ SP ~ Surviving Progress
~ KA-BS-A-IC ~ Killer Apps – Bad Software – And – Its Consequences
~ SD ~ Software Damages
~ RDP-A-RP ~ Reducing Data Pollution – And – Reclaiming Privacy
~ KTP ~ Kill The Password
~ EBD ~ Encryption By Default
~ TABOOCC-EIE ~ Taking A Byte Out Of Cyber Crime – Education Is Essential
~ THF-TFWL ~ The Human Factor – The Forgotten Weak Link
~ BHCDTS ~ Bringing Human-Centered Design To Security
~ M(N)KB-BAISFTI ~ Mother (Nature) Knows Best – Building An Immune System For The Internet
~ PTTFC ~ Policing The Twenty-First Century
~ PST-TNFGCH ~ Practicing Safe Techs – The Need For Good Cyber Hygiene
~ WTP ~ We The People
~ GTS ~ Gaming The System