Data breaches drive identity theft and fraud
Data breaches are affecting consumers nationwide and residents in and around Washington, D.C. are not immune to the consequences. According to a survey by Experian, 57 percent have been a victim of...
View ArticlePassword Security: Reality or Joke?
Cyber #security is a top concern in the IT industry today. In this series, we will look at various #threats to cyber security – and what steps businesses can take to meet those threats head on. Here,...
View ArticleIs this the future of online security? Why uQontrol thinks its Qkey is different
US-based startup uQontrol has pre-launched what it claims is the world’s first ‘three-factor’ authentication token consumers can use to secure online shopping transactions and personal data from...
View ArticleHow open source can improve your software’s security
Let’s be blunt: your code is full of #security holes. Just as bad, your employees are careless with passwords and other ways of cracking into your data. Hence, while we may wring our hands over...
View ArticleCongress moves quickly on cyberthreat information sharing
The U.S. Congress is moving forward quickly with legislation that would encourage private companies to share cyberthreat information with government agencies, despite concerns that two leading bills...
View ArticleHow secure is your Wi-Fi? 3 things small businesses need to know
If you don’t have a wireless network in your business, you might as well be in the dark ages – or that’s what your employees, customers and guests will tell you. You’d be hard-pressed to find a cafe,...
View ArticleOpenSSL Patch to Plug Severe Security Holes
The world is about to get another reminder about just how much of the Internet runs on technology maintained by a handful of coders working on a shoestring budget. #openssl — the software used by...
View ArticleDigital certificates and encryption keys a growing stress for UK organisations
UK IT professionals are starting to worry about encryption keys and #certificates. Many don’t know how many their organisations possess or even where some are stored. All of them think these assets are...
View Article“Your location has been shared 5398 times”– Do we need a privacy assistant on...
Do you know how much information your smartphone is giving away to app makers and advertisers? Lots of people have “no idea,” according to a computer scientist at Carnegie Mellon University, who...
View ArticleWhy you should be spending more on security
Many CIOs endanger their companies simply by not spending enough on #security. That may seem odd to posit, given that a recent Pricewaterhouse Coopers survey found that businesses now spend a higher...
View ArticleWhat`s complicating your security readiness?
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment that’s challenging for...
View ArticleSmart home hacking is easier than you think
Last March, a very satisfied user of the Honeywell Wi-Fi Thermostat left a product review on Amazon.com that shed some light on an unexpected benefit of the smart home – revenge. The reviewer wrote...
View ArticleChinese government linked to largest DDoS attack in GitHub history
On March 26, 2015, a very well-coordinated distributed denial of service (#ddos) #attack was waged on GitHub, the heir apparent to the now-closing Google Code. GitHub characterized this as the largest...
View ArticleWant to secure your social info? Facebook shows you how
Facebook today launched 11 interactive guides and how-tos to help users secure their #social information. The new guides, which can be found on the Facebook Privacy Basics site, are designed to help...
View ArticleGoogle cracks down on ad-injecting Chrome extensions
Google has identified and disabled 192 Chrome browser extensions that injected rogue ads into Web pages opened by users without being upfront about it. The company will scan for similar policy...
View ArticleCyberwar heats up in the Middle East
Two new #malware campaigns have been spotted in the Middle East, according to reports released this week, one targeting energy companies and the other going after political targets in Israel and...
View ArticleIt’s time to research new ways to fight DDoS attacks
Almost 1-in-5 (18-percent) of businesses experienced a distributed denial-of-service #attack within a year-long timeframe, according to the Global IT #security Risks Survey 2014—Distributed Denial of...
View ArticleWhat happens to data after a breach?
Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, landing in five different...
View ArticleA guide to monetizing risks for security spending decisions
#security executives routinely have to make tough decisions about which risks to mitigate, which to avoid or transfer and which to accept.Your security budget has its limits. You have a finite amount...
View ArticleIoT devices facilitate robbery, stalking and cybercrime
The foundation of the Internet of Things (#iot) – the devices themselves plus their associated mobile applications and cloud services – are often not designed with #data #security or #privacy in mind,...
View Article