Quantcast
Channel: Tech Insurance Small Business Center - Data BreachTech Insurance Small Business Center0.0000000.000000
Browsing all 465 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Google's "End-to-End" Like a Seatbelt for Email

For a long time, transportation safety advocates knew that seatbelts would save lives. However, it wasn't until the 1960s that manufacturers were required to install them in cars, and it wasn't until...

View Article


Image may be NSFW.
Clik here to view.

Do We Need a Miss Manners of Data Breaches?

At her peak, Judith Martin, aka Miss Manners, wrote a popular advice column that was featured in over 200 newspapers. She helped guide many hapless people through difficult social situations – and some...

View Article


Image may be NSFW.
Clik here to view.

Home-Grown Data Breaches: How the Internet of Things Is Increasing Your Exposure

The investment resource site MotleyFool reports that Apple announced it would produce software designed to work with the Internet of Things, joining its competitors Google, Microsoft, and Samsung in...

View Article

Image may be NSFW.
Clik here to view.

Why Passwords Matter: The Tricky World of Cyber Insurance

The Columbus Dispatch reports that insurance companies don't yet have reliable models for calculating client cyber risk, so it's hard for them to write policies that cover all the exposures a client...

View Article

Image may be NSFW.
Clik here to view.

Do We Need a Miss Manners of Data Breaches?

At her peak, Judith Martin, aka Miss Manners, wrote a popular advice column that was featured in over 200 newspapers. She helped guide many hapless people through difficult social situations – and some...

View Article


Image may be NSFW.
Clik here to view.

Yo App Hacked

The BBC reports that one of the silliest and least useful apps of all time – a messaging service called Yo – has major security flaws. That's not really accurate. To say that Yo has "security flaws" is...

View Article

Image may be NSFW.
Clik here to view.

Need a Revenue Boost? Think Hedge Funds

According to Digital Journal, hedge funds – the high-profile investment firms – are the latest industry to recognize their cyber exposure and could be a great source of new clients for IT...

View Article

Image may be NSFW.
Clik here to view.

Defense Against the Hacking Arts Requires CONSTANT VIGILANCE

According to ThreatPost, researchers have found a way to bypass PayPal's two-factor authentication an enhanced security feature recommended by many security experts. This proves – much like in the...

View Article


Image may be NSFW.
Clik here to view.

Data Security Turbulence: New Attacks Target Airport Security

The security and risk management site CSO Online reports that 75 U.S. airports have been affected by cyber attacks, and four airports received "advanced persistent attacks" – a sign that hackers are...

View Article


Image may be NSFW.
Clik here to view.

Terrifying New Android Malware Is Basically a Brain Parasite for Smartphones

It's easy to overreact about new cyber threats, but as ThreatPost reports, a piece of fledgling Android malware is pretty much a brain virus that might create an army of infected zombie smartphones...

View Article

Image may be NSFW.
Clik here to view.

How Florida's New Data Breach Law Could Cost Tech Businesses

As the federal government hems and haws its way through new data breach legislation, states are springing into action to pass their own, tougher data breach laws – it’s just happened in Florida where...

View Article

Image may be NSFW.
Clik here to view.

Hotel Hippo Closure Would Be a Wakeup Call for Small Businesses (If Anyone...

SCMagazine reports that hotelhippo.com, a hotel reservation site, has shuttered after poor security led to a data breach.Though the company was small and only 24 customers were affected, the data...

View Article

Image may be NSFW.
Clik here to view.

Schnucks Settlement Breaks Down Why Data Breaches Are So Expensive

The St. Louis Post-Dispatch reports that more than a year and a half after its customers were first affected, the Midwestern grocery store Schnucks has settled its data breach lawsuit and will pay...

View Article


Image may be NSFW.
Clik here to view.

Is It Time to Start Preaching Data Breach Management, Not Prevention?

Infosecurity issues a statement guaranteed to shock many business owners: data breaches are inevitable. With breaches bound to happen, data security experts are beginning to offer a new take on IT risk...

View Article

Image may be NSFW.
Clik here to view.

Zombie Botnet Reminds Us that Cyber Crime Isn't Going Away

TechCrunch reports that cyber criminals have brought a botnet back to life, and like all zombies, this reanimated botnet is stronger than before!Botnets are massive collections of computers that...

View Article


Image may be NSFW.
Clik here to view.

Identity Theft Costs $24.7 Billion Per Year, More Than All Property Crime...

If your clients are wary of investing in cyber security, all you need to do is give them one number: $24.7 billion. That's the amount of damages caused by cyber criminals each year. It's more than all...

View Article

Image may be NSFW.
Clik here to view.

Hackety-Hack, Don't Click That (Even Savvy Bitcoin Bidders Are Getting Phished!)

The Wall Street Journal reports on a recent hack that shows spear phishing can hit anyone, even the most tech savvy Bitcoin companies. We'll look at how this attack stole tens of thousands from one...

View Article


Image may be NSFW.
Clik here to view.

What the Apple-IBM Partnership Means for IT Professionals

ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...

View Article

Image may be NSFW.
Clik here to view.

Blackphone and Blackberry Duke It Out, But the Fight May Be Futile

A recent ZDNet article gives a blow-by-blow account of the fight between Blackberry and Blackphone over which company offers better mobile security. In a series of back-and-forth blog posts, the...

View Article

Image may be NSFW.
Clik here to view.

Data Breach Research Shows Hackers Love Weak Java

Symantec's Internet Security Threat Report, a post-mortem analysis of the previous year's cyber attacks, comes to a startling conclusion: 97 percent of zero-day attacks were Java based.A zero-day...

View Article
Browsing all 465 articles
Browse latest View live