Black Hat Security Conference: Hackers Can Steal Your Car
Last week's Black Hack security conference brought exposure to countless security flaws in nascent Internet-of-Things technology. CBS News reports that security consultants have found ways to...
View ArticleThe Puns Are Bad, but the Security Threats Are Worse
The average user probably doesn't even suspect that their SOHO (small office / home office) router could be hacked. When your small business clients think about network security, they probably only...
View ArticleOld Technology Is a Cyber Liability
In last week’s blog post, "Black Hat Security Conference: Hackers Can Steal Your Car,” we looked at how new technology – the Internet-of-Things and Internet-enabled cars – exposed consumers to greater...
View ArticleFacebook Color-Changer Malware Has Users Feeling Blue
TechHive reports that over 10,000 users have fallen victim to a Facebook-based malware attack. Like other schemes before it, the color-changer malware purports to allow users to customize their...
View ArticleHow Much Does a Data Breach Cost?
The final cost of a data breach can be hard to pin down. Dozens of factors affect the cost of a breach, and you can’t know what the total price tag will be until the dust settles. Sometimes, that takes...
View ArticleSurvey: 80% of IT Security Professionals Overestimate Their Data Breach...
BroadwayWorld reports on a new cyber security survey, which shows that 80 percent of IT professionals think they can detect a data breach within a week. That would be great news if it were true. In the...
View ArticleOnly 1% of Cloud Service Providers Meet Proposed EU Regulations (and Why This...
The European Union's new data security regulations could come into effect as soon as 2015 or 2016 (they aren't law yet), but as ZDNet reports, practically no cloud service providers are prepared to...
View ArticleCDD Complaint Suggests We're in the "Wild West" Stage of Digital Privacy
ITworld reports on a brewing data security dispute between a group of 30 U.S. companies and the privacy watchdog Center for Digital Democracy. Companies such as AOL and Adobe have been accused of not...
View ArticleCDD Complaint Suggests We're in the "Wild West" Stage of Digital Privacy
ITworld reports on a brewing data security dispute between a group of 30 U.S. companies and the privacy watchdog Center for Digital Democracy. Companies such as AOL and Adobe have been accused of not...
View ArticleStudy: Half of Businesses Will Hire IT Security Contractors by 2018
A study recently published by technology research firm Gartner shows that spending on IT security has increased 7.9 percent so far in 2014, to $71.1 billion. Based on trends, the firm predicts that...
View ArticleInnovative Malware Offers Another Argument against Jailbreaking
SecurityWeek reports on a new and innovative malware that hackers are using against jailbroken iOS mobile devices.The malicious software, dubbed iOS / AdThief or Spad, modifies various apps' SDK so...
View ArticleE-Discovery Firm's Growth Highlights Growing Cyber Liabilities All Around
One of the reasons we see an increasing number of large data breaches is simply because there's more data now than ever before. This data explosion is producing a growing market for IT companies that...
View ArticleHacking Victims May Have a New Worry: FTC Penalties
This week on the blog, we've discussed the difficulties IT professionals have with data security laws: they don't know which data security laws (if any) they need to follow and they don't know how...
View ArticleAOL's New Privacy Policy More of a No-Privacy Policy
As MediaPost reports, AOL's recent changes to its privacy policy highlight how important it is for small-business owners to inform their customers about changes to their data collection, advertising,...
View ArticleBackground Check Firm that Cleared Edward Snowden Suffers Data Breach
According to the Washington Post, USIS – the background check company that botched Edward Snowden's screening process – was in the midst of one of its worst years when it found out that it had been the...
View ArticleSecurity Is Everyone's Job: Lessons from a Weak-Password Hack
Prairie Business Magazine reports on the data breach at the North Dakota University System that exposed almost 300,000 users' data. In addition to the sheer size of the breach, what makes it remarkable...
View ArticleNightmare Lawsuit against App Developers Probably Costing Boatloads
MediaPost reports on a class-action lawsuit against app developers that has been going on for over two years after a number of big-name Internet companies downloaded iPhone users' address books onto...
View ArticleWhy a Cyber Attack at Your Bank Could Be Terrible News
While individual consumers can be reimbursed for fraudulent charges on their bank accounts, it's much harder for businesses to recover damages related to a cyber heist. This means it's important for IT...
View ArticleDairy Queen's Data Leaked Like Ice Cream from a Cone on a Hot Day
As a last hurrah before summer fades, hackers got a taste for ice cream and decided to attack the summertime staple Dairy Queen. We're only partially kidding.In the winter, we saw hackers go after...
View ArticleNetflix: Use Our Hack-Scanning Software
Though it might be most famous its binge-watch streaming service, Netflix has produced open source tools that can protect businesses from data breaches and DDoS attacks.According to The Register,...
View Article