How to protect yourself after the Home Depot breach

Home Depot has issued a statement today that provides more details about their recent breach, as well as indicating that the malware used by the attackers has now been removed from their systems. This breach appears to be even larger than Target’s, as it exposed payment information for 56 million customers in their US and Canada locations.

National Health IT Week – tips for starting Risk Assessment

This week is National Health IT Week, and you may be wondering – what is the best way to observe this occasion? While planning for catastrophe may not seem the most celebratory activity, this week is a great occasion to start or review your organization’s risk assessment.

Anti-surveillance mask enables you to pass as someone else

If you are not comfortable with the surveillance cameras, an identity replacement technology that is basically a Surveillance identity prosthetic provides you a new face. If you find all people around you having the same face like you saw the agents in Matrix 3, then Leo Selvaggio is the one to thank. He has designed a […]

How to Install Gnome Desktop Environment in Ubuntu 14.04 LTS?

Gnome  is one of the most popular and most used desktop environment for Linux systems . It is a desktop environment which is composed entirely of free and open-source software and targets to be cross-platform, i.e. run on multiple operating systems, its main focus being those based on the Linux kernel. If you don’t have […]