Wed, 26 Oct 2016 17:30:00 -0400Fraud losses incurred by banks andmerchants on all credit, debit, and pre-paid general purpose and private label payment cards issued globally hit $21.84 billion (bn) in 2015, with the United States (US) accounting for almost two-fifths (38.7%) of the total at $8.45bn. But by 2020 it could surpass $12bn, were [...]
Wed, 26 Oct 2016 13:36:00 -0400By Casey Talon Large building owners have been investing in intelligent building technologies and leveraging these data-driven solutions to reduce costs, improve operational and energy efficiencies, and achieve broader corporate objectives like sustainability. Small and medium building (SMB) owners, on the other hand, often struggle to maintain profits and sustain slim [...]
Wed, 26 Oct 2016 10:00:00 -0400And so it begins. Last week we experienced the first security attack publicly and widely attribute to the Internet of Things (IoT). This day has been a long time in coming. It’s really far from the first IoT security breech mind you, but this is the first one that affected [...]
Wed, 26 Oct 2016 08:43:00 -0400With emotions running high, you can easily get scammed on World Series tickets. Here's how to protect yourself.
Wed, 26 Oct 2016 08:14:00 -0400Digitization isn’t merely a buzzword. The digital transformation of your business can have a serious impact on your organization – particularly as it applies to your supply chain operations. For instance, a digital supply chain can lower procurement costs by 20%, reduce supply chain process costs by 50%, and increase revenue [...]
Wed, 26 Oct 2016 06:40:00 -0400Mobile Pwn2Own contest dominated by Chinese hacker pros Keen Lab, who stole photos from an iPhone and installed malware on a Nexus 6P.
Wed, 26 Oct 2016 05:12:00 -0400While Japan has never dealt with a giant physical monster in real life, the film is right on the money in terms of how bureaucratic institutions plan for and respond to threats.
Tue, 25 Oct 2016 13:26:00 -0400US-based start-up CentzInc. has vowed to “disrupt” the global gift card industry at the Money 2020 and CoinAgenda trade shows in Las Vegas, giving consumers control of their gift cards by combining all such card balances into a single lump sum that is denominated in digital currency Centz Gold Bucks [...]
Tue, 25 Oct 2016 11:00:00 -0400The $3.5 billion startup Tanium has bigger targets than hackers.
Tue, 25 Oct 2016 10:39:00 -0400When it comes to cyber security, the average business on Main Street may not have the most sophisticated systems in place, but businesses can benefit from educating employees, implementing basic safety filters, and learning to strike the right balance between security and usability.
Tue, 25 Oct 2016 08:00:00 -0400Whistleblowers say Procera Networks was supplying a feature to extract usernames and passwords of millions of Turkish citizens.
Mon, 24 Oct 2016 18:38:00 -0400Protecting vehicles from malicious cyber-attacks and unauthorized access is a growing issue and today the federal government took action. A proposed series of recommendations to the automotive industry aimed to improve cybersecurity safety were announced today by the U.S. Department of Transportation's National Highway Traffic Safety Administration (NHTSA).
Mon, 24 Oct 2016 13:46:00 -0400In this picture taken on March 5, 2015, a map of the United States displayed on a computer screen shows cyber attacks in real time at the headquarters of Bitdefender, a leading Romanian cyber security company, in Bucharest, Romania. (AP Photo/Octav Ganea, Mediafax) Cyber thieves are increasingly targeting mobile phones. News [...]
Mon, 24 Oct 2016 10:41:00 -0400VideoThis is the second of a four-part article about the security of mechanical locks and how they can be easily compromised, often in seconds, with simple to sophisticated tools that are readily available. We all rely upon locks to protect our homes, businesses, assets, and vehicles, but how well do [...]
Mon, 24 Oct 2016 10:17:00 -0400The top ten technology trends are interesting, but how does one become more familiar with the concepts noted to determine their relevance and priority? This is a collection of books, articles, and podcasts to consume to get smart quickly on the relevant concepts.
Sun, 23 Oct 2016 17:37:00 -0400Yes, you can get scammed by political calls. Here's how to protect yourself.
Sun, 23 Oct 2016 16:23:00 -0400Hackers are selling access to a huge IoT botnet that could cause more carnage after Friday's massive outage.
Sun, 23 Oct 2016 11:30:00 -0400These days my worst nightmare involves Social Security. Having written a book and co-developed software to help people collect Social Security benefits I’ve come to realize just how critically important are the Social Security earnings record histories we accumulated while working. Without those records Social Security would have no way to know what to pay us. Or if those records were the subject of tampering, we could be given dramatically more or less benefits than we were owed.
Fri, 21 Oct 2016 23:57:00 -0400The IoT security nightmare will take an age to fix, and we may not have that long.
Fri, 21 Oct 2016 18:04:00 -0400A number of popular high-traffic websites were compromised today by a cyber attack on Dyn, a cloud-based Internet Performance Management (IPM) company. The most significantly affected reported areas include the American Northeast, Mid-Southwest and Eastern U.K.
Fri, 21 Oct 2016 16:35:00 -0400One of the two major candidates running for President seems to have already accepted defeat and moved straight to whining and assigning blame with claims that the election is rigged. The reality—whether we’re talking about an enemy nation-state hacking election results, a coordinated effort to cast fraudulent votes in the [...]
Fri, 21 Oct 2016 16:10:00 -0400A coordinated attack on DNS host Dyn caused Twitter, Netflix, Amazon and other websites to go down.
Fri, 21 Oct 2016 03:39:00 -0400Internet security company SecureWorks has worked out how Fancy Bear hacked John Podesta's Gmail account. Here's how they did it and how you can keep it from happening to you.
Thu, 20 Oct 2016 17:02:00 -040010 guns, including an AR-style weapon, as well as 50TB in data seized during search of NSA contractor Harold T. Martin III. The former Booz Allen Hamilton contractor is expected to face espionage charges.
Thu, 20 Oct 2016 10:06:00 -0400What Julian Assange’s internet being cut teaches us about the power of the dentralized web and how the recentralizing effect of Facebook’s walled garden could spell the end of Wikileaks and its peers
Wed, 19 Oct 2016 14:09:00 -0400As the modi operandi of fraudsters evolve, organizations need to also improve their defenses and align their fraud detection to the dynamic threats they face.
Tue, 18 Oct 2016 19:53:00 -0400MANRS at network operators should improve Internet security, needed to improve on-line storage security. Also the number of companies offering cloud-like local storage tied to on-line storage has increased with the addition of Igneous and IBM. Software defined storage company Caringo introduces is improved Swarm 9 product.
Tue, 18 Oct 2016 15:58:00 -0400Gartner Symposium is currently under way in Orlando. Vice President and Gartner Fellow in Gartner Research, David Cearley has identified a top ten strategic technology trends for the year ahead. He defines “strategic” as those technologies that will have significant disruptive potential over the next five years.” He also notes [...]
Tue, 18 Oct 2016 11:38:00 -0400Fallout from ID theft include stress, anxiety and insomnia, as well as missed work and reliance on welfare.
Tue, 18 Oct 2016 08:33:00 -0400British spies illegally collected vast amounts of personal data for more than a decade, senior judges have ruled.