Google's "End-to-End" Like a Seatbelt for Email
For a long time, transportation safety advocates knew that seatbelts would save lives. However, it wasn't until the 1960s that manufacturers were required to install them in cars, and it wasn't until...
View ArticleDo We Need a Miss Manners of Data Breaches?
At her peak, Judith Martin, aka Miss Manners, wrote a popular advice column that was featured in over 200 newspapers. She helped guide many hapless people through difficult social situations – and some...
View ArticleHome-Grown Data Breaches: How the Internet of Things Is Increasing Your Exposure
The investment resource site MotleyFool reports that Apple announced it would produce software designed to work with the Internet of Things, joining its competitors Google, Microsoft, and Samsung in...
View ArticleWhy Passwords Matter: The Tricky World of Cyber Insurance
The Columbus Dispatch reports that insurance companies don't yet have reliable models for calculating client cyber risk, so it's hard for them to write policies that cover all the exposures a client...
View ArticleDo We Need a Miss Manners of Data Breaches?
At her peak, Judith Martin, aka Miss Manners, wrote a popular advice column that was featured in over 200 newspapers. She helped guide many hapless people through difficult social situations – and some...
View ArticleYo App Hacked
The BBC reports that one of the silliest and least useful apps of all time – a messaging service called Yo – has major security flaws. That's not really accurate. To say that Yo has "security flaws" is...
View ArticleNeed a Revenue Boost? Think Hedge Funds
According to Digital Journal, hedge funds – the high-profile investment firms – are the latest industry to recognize their cyber exposure and could be a great source of new clients for IT...
View ArticleDefense Against the Hacking Arts Requires CONSTANT VIGILANCE
According to ThreatPost, researchers have found a way to bypass PayPal's two-factor authentication an enhanced security feature recommended by many security experts. This proves – much like in the...
View ArticleData Security Turbulence: New Attacks Target Airport Security
The security and risk management site CSO Online reports that 75 U.S. airports have been affected by cyber attacks, and four airports received "advanced persistent attacks" – a sign that hackers are...
View ArticleTerrifying New Android Malware Is Basically a Brain Parasite for Smartphones
It's easy to overreact about new cyber threats, but as ThreatPost reports, a piece of fledgling Android malware is pretty much a brain virus that might create an army of infected zombie smartphones...
View ArticleHow Florida's New Data Breach Law Could Cost Tech Businesses
As the federal government hems and haws its way through new data breach legislation, states are springing into action to pass their own, tougher data breach laws – it’s just happened in Florida where...
View ArticleHotel Hippo Closure Would Be a Wakeup Call for Small Businesses (If Anyone...
SCMagazine reports that hotelhippo.com, a hotel reservation site, has shuttered after poor security led to a data breach.Though the company was small and only 24 customers were affected, the data...
View ArticleSchnucks Settlement Breaks Down Why Data Breaches Are So Expensive
The St. Louis Post-Dispatch reports that more than a year and a half after its customers were first affected, the Midwestern grocery store Schnucks has settled its data breach lawsuit and will pay...
View ArticleIs It Time to Start Preaching Data Breach Management, Not Prevention?
Infosecurity issues a statement guaranteed to shock many business owners: data breaches are inevitable. With breaches bound to happen, data security experts are beginning to offer a new take on IT risk...
View ArticleZombie Botnet Reminds Us that Cyber Crime Isn't Going Away
TechCrunch reports that cyber criminals have brought a botnet back to life, and like all zombies, this reanimated botnet is stronger than before!Botnets are massive collections of computers that...
View ArticleIdentity Theft Costs $24.7 Billion Per Year, More Than All Property Crime...
If your clients are wary of investing in cyber security, all you need to do is give them one number: $24.7 billion. That's the amount of damages caused by cyber criminals each year. It's more than all...
View ArticleHackety-Hack, Don't Click That (Even Savvy Bitcoin Bidders Are Getting Phished!)
The Wall Street Journal reports on a recent hack that shows spear phishing can hit anyone, even the most tech savvy Bitcoin companies. We'll look at how this attack stole tens of thousands from one...
View ArticleWhat the Apple-IBM Partnership Means for IT Professionals
ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...
View ArticleBlackphone and Blackberry Duke It Out, But the Fight May Be Futile
A recent ZDNet article gives a blow-by-blow account of the fight between Blackberry and Blackphone over which company offers better mobile security. In a series of back-and-forth blog posts, the...
View ArticleData Breach Research Shows Hackers Love Weak Java
Symantec's Internet Security Threat Report, a post-mortem analysis of the previous year's cyber attacks, comes to a startling conclusion: 97 percent of zero-day attacks were Java based.A zero-day...
View Article