Subscribe: Forbes.com: Security
http://www.forbes.com/security/index.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
business  company  cyber  data  don  hackers  internet  law  malware  online  security  site  software  space  system  users  world 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Forbes.com: Security

Forbes - Security



Forbes - Security



Copyright: Copyright 2016 Forbes LLC
 



Exodus Intel -- The Zero-Day Dealer Whose Worrisome Tor Hack Helped Cops Bust Child Porn Site

Fri, 2 Dec 2016 11:02:00 -0500

Activists are concerned about the leak of a zero-day vulnerability by a government contractor, used to expose the identities of a Tor-based site.


Media Files:
http://specials-images.forbesimg.com/imageserve/8e4cb71a936e440589e1553281f1a36b/0x600.jpg?fit=scale




Windows Support Scammers Are Resorting To Ransomware Tactics

Fri, 2 Dec 2016 10:34:00 -0500

Fraudsters have been running Windows tech support scams for years. Recently, however, their tactics have become even more insidious.


Media Files:
http://blogs-images.forbes.com/leemathews/files/2016/12/vindows.jpg?width=0&height=600




Bitcoin Users Brace For IRS Audits From Coinbase Summons

Fri, 2 Dec 2016 09:12:00 -0500

Bitcoin users and others could face IRS probes now that Coinbase records are in the IRS crosshairs. Be prepared.


Media Files:
http://specials-images.forbesimg.com/imageserve/38449608/0x600.jpg?fit=scale




The Law That Could Allow Trump To Shut Down The US Internet

Fri, 2 Dec 2016 07:00:00 -0500

Photo by Mike Licht, NotionsCapital.com In a pair of recent essays, Timothy Edgar,the academic director of law and policy at Brown University's Executive Master in Cybersecurity program, has outlined the legal basis for how a President Donald Trump could potentially shut down the U.S. internet in response to a national [...]


Media Files:
http://www.seanlawson.net/wp-content/uploads/2016/12/8230418753_c5297f850e_m_internet-kill-switch-1.jpg




If You Holiday Shop Online, Don't Ignore This Warning About Malware That Targets Holiday Shoppers

Fri, 2 Dec 2016 03:07:00 -0500

Enigma Software reports that malware infections during the four days from Black Friday to Cyber Monday more than doubled compared to the rest of November.


Media Files:
http://blogs-images.forbes.com/kevinmurnane/files/2016/12/Santa-with-a-gun_Shutterstock640q-500x500.jpg?width=0&height=600




How To Use Insurance Markets To Improve US Cybersecurity

Thu, 1 Dec 2016 18:38:00 -0500

Robert Knake, a cybersecurity expert with the the Council on Foreign Relations, has recently released a report calling for the creation of a federally sponsored cyber insurance program. The report argues: Anticipating a catastrophic event in cyberspace, Congress should put in place a federal backstop for cyber insurance. Doing [...]



Researchers Break Apple's iPhone And iPad Activation Lock

Thu, 1 Dec 2016 17:08:00 -0500

The activation lock feature Apple introduced when the iPhone 6 launched made the devices a lot less attractive to would-be thieves. But like a lot of physical locks, the software activation lock in iOS can be forced open if you know the right tricks.


Media Files:
http://blogs-images.forbes.com/leemathews/files/2016/11/iphone.jpg?width=0&height=600




How Do You Keep People Safe When Peanut Butter Looks The Same As Explosives To An X-Ray?

Thu, 1 Dec 2016 13:42:00 -0500

Terrorism is big business but when x-rays are mistaking peanut butter for explosive a better system is needed. A startup from the University of Helsinki just may stop 99% of bombs getting onto planes.



Data Breach Lawsuits Not Avoidable, But Reasonable Security Helps, Expert Says

Thu, 1 Dec 2016 10:20:00 -0500

David Willson, a retired Army officer, attorney and now owner of Titan Info Security Group, travels the country, educating CEOs and executives on how to protect their companies from data breaches, which have become increasingly common in recent years. His No. 1 piece of advice to companies: implement what he calls [...]



CA Technologies Announces Intent To Acquire Enterprise Automation Leader Automic

Thu, 1 Dec 2016 09:00:00 -0500

CA Technologies announced today its intent to acquire Austria-based Automic Holding GmbH for approximately €600 million ($636 million). The respective boards of directors have approved the deal, which is expected to close by the end of March 2017.


Media Files:
http://blogs-images.forbes.com/jasonbloomberg/files/2016/12/gregoire.jpg?width=0&height=600




For Asia And The World, The Time To Invest In Outer Space Infrastructure Is Now

Wed, 30 Nov 2016 20:52:00 -0500

Infrastructure investment is on the forefront of political agendas around the world. This spotlight must also now be lifted above us to outer space, where new space industries are building, extending, and connecting a space-based infrastructure to the planet as never before.


Media Files:
http://specials-images.forbesimg.com/imageserve/615569664/0x600.jpg?fit=scale




South Korea's Online Banking System Is Stuck In 1996

Wed, 30 Nov 2016 15:37:00 -0500

South Korea’s online banking infrastructure is a mutation of its own. Desktop users can only use PCs running Internet Explorer.


Media Files:
http://specials-images.forbesimg.com/imageserve/512445955/0x600.jpg?fit=scale




Why You Shouldn't Fear The Malware That Compromised A Million Google Accounts

Wed, 30 Nov 2016 15:23:00 -0500

Reports are circulating that more than a million Google users have had their credentials stolen by cybercriminals. Security experts believe the malware responsible is stealing 13,000 more passwords every day.


Media Files:
http://blogs-images.forbes.com/leemathews/files/2016/11/android.jpg?width=0&height=600




How A Trump Presidency Will Erode Cyber Privacy And National Security

Wed, 30 Nov 2016 14:55:00 -0500

What will a Trump presidency mean for cyberspace? Veteran investor and entrepreneur David Cowan argues it will mean the introduction of stop-and-frisk in cyberspace alongside deregulation that could prove dangerous for individual privacy as well as national security.


Media Files:
http://specials-images.forbesimg.com/imageserve/624726050/0x600.jpg?fit=scale




5 Naughty Scams To Watch Out For This Holiday Season

Wed, 30 Nov 2016 11:30:00 -0500

Ranging from gift card scams and the sale of counterfeit goods to fake charities, here are some common ways fraudsters try to deceive consumers, especially during this celebratory time of the year.


Media Files:
http://specials-images.forbesimg.com/imageserve/56307/0x600.jpg?fit=scale




Android 'Gooligan' Hackers Just Scored The Biggest Ever Theft Of Google Accounts

Wed, 30 Nov 2016 08:59:00 -0500

Android malware spreading fast and businesses' Google accounts are being compromised as well as individuals.


Media Files:
http://specials-images.forbesimg.com/imageserve/3dd731d8b2b9496bb19a6b00c63a0103/0x600.jpg?fit=scale




SAPVoice: How Mexico City Became A Hotbed For Startups

Wed, 30 Nov 2016 08:19:00 -0500

By Robin Meyerhoff, Senior Director, Corporate Affairs, SAP On the corner of Moneda and Licenciado Primo Verdad streetsin Mexico City sits the first printing press in the Americas, established in 1539. Not far from that historic site of innovation is the Zona Rosa, one of many neighborhoods in the city [...]


Media Files:
http://blogs-images.forbes.com/sap/files/2016/11/shutterstock_477828778-1200x801.jpg?width=0&height=600




Europe's Space Data Highway Is Making The World A Safer Place [Infographic]

Wed, 30 Nov 2016 06:00:00 -0500

In a world where we have satellite radio, satellite TV, satellite internet service, GPS, and other services delivered to us from above its nice to know that someone is pushing this technology to make our lives better and to provide additional security for everyone. Recently, the European Data Relay System began [...]



The No. 1 Lesson Video Games Teach You About Marriage

Tue, 29 Nov 2016 20:01:00 -0500

Even the most seasoned gamer knows not to tread lightly around a role-playing game's save point. Godspeed, Tom. Cartoon by Steve Napierski.


Media Files:
http://blogs-images.forbes.com/cartoonoftheday/files/2016/11/161129NapierskiExcerpt-500x500.jpg?width=0&height=600




Cleaning Up After Boomers: 33 Cartoons About MillennialsMillennials ... am I right?The Ultimate First World ProblemThe Best Argument For Solving Climate ChangeThe Perils Of A Star Wars-Themed WeddingDriverless Cars Are Missing A Human TouchBatman V Superman: Dawn Of 'Hug It Out Bro'For Millennials, The American Dream Is Rented, Not OwnedMy Religion Is Breaking My BrainKeep Calm And Play 'Pokémon GO'The One Sure Way To Get Your Kickstarter CrowdfundedHipster Horror StoriesI'm Here To Help, GrandpaEvolution Of The Millennial CommuteSelfie Do's and Don'tsSamsung's New Galaxy Note 7 Is The BombFinally! An 'American Ninja' Competition For The Netflix Warrior In Us AllMillennials Don't Email ... They SlackVictimized By An Airbnb Racist? Good Luck With That ...Mating Rituals Of The Digital Age'Pokémon GO': Expand Your World, Meet New People, Get Robbed By ThemEmotional Assistance Animals in Rental Housing: A How-to GuideHarriet Tubman $20 Bill In The Era Of Apple PayThe Honest MechanicSan Francisco's Millennium Tower Is SinkingNew Testament, Old Complaints#NetflixAndChill ... 5 Years laterThe Bicycle Commute Made ... Easy?Entering The Work Force With HonestyWill 'Smart Clothes' Save Or Doom Millinnials?Catfishing: Another Concern Of Video Job InterviewsThe Night Is Dark And Full Of SpoilersPrince Fans Pay Tribute By Paying For His MusicThe Land Of OpportunityWhat Do Women Want From Video Games?

Tue, 29 Nov 2016 20:01:00 -0500


Media Files:
http://specials-images.forbesimg.com/imageserve/570575fbe4b0fd7369a3e242/0x600.jpg?fit=scale&background=000000




China's Cyber Security Law: Can Foreign Parties Sue China's Technology Cos. for Violating the Law?

Tue, 29 Nov 2016 19:29:00 -0500

With China’s passage this month of its Cyber Security Law (the “Law”; unofficial English translation on China Law Translate), much of the attention in the international business community has focused on how business obligations will change for mainland China operations and how the law will generally affect cross-border handling of [...]



Russia Avoids Android To Secure Its Smartphone Future

Tue, 29 Nov 2016 19:23:00 -0500

Finnish-based smartphone and software developer Jolla has announced that its mobile operating system, Sailfish OS, has been accepted as "the only mobile OS in Russia to be used in governmental and government controlled corporations’ upcoming mobile device projects."


Media Files:
http://blogs-images.forbes.com/ewanspence/files/2014/10/jolla_square-500x500.jpg?width=0&height=600




Apparent xHamster Hack Puts 380,000 Users In Compromising Position

Tue, 29 Nov 2016 17:09:00 -0500

Users of the free adult website xHamster are being advised to change their passwords immediately. The reason: private data on 380,000 xHmaster users is being passed around on the Dark Web.


Media Files:
http://blogs-images.forbes.com/leemathews/files/2016/11/lips.jpg?width=0&height=600




World's Biggest Mirai Botnet Is Being Rented Out For DDoS Attacks

Tue, 29 Nov 2016 11:59:00 -0500

Years ago, it took a lot of work to wrangle enough bots into a botnet to cause a serious amount of chaos. Today it's only as hard as tracking down the right seller on the Dark Web, even if you're after the most powerful Mirai botnet on the planet.


Media Files:
http://blogs-images.forbes.com/leemathews/files/2016/11/ddos-1200x595.jpg?width=0&height=600




Friendly Fire -- Employees Pose The Greatest Cyber Risk

Tue, 29 Nov 2016 11:57:00 -0500

"Nearly half of all companies don’t have security awareness training. That’s staggering and completely counterintuitive."


Media Files:
http://blogs-images.forbes.com/christopherskroupa/files/2016/11/Fotolia_106839736_Subscription_Monthly_M-1200x669.jpg?width=0&height=600




8 Simple Rules For Beating Hackers And Cyber-Thieves7 Simple Rules To Help You Protect Your Business From Hackers And Cyber-Thieves1) Don't Store Credit Card Data On Your Servers2) If You're Selling Goods Online, Work With A Reputable Third-Party Sales Platform (do NOT go it alone)3) Purchase High End Anti-Virus and Anti-Malware Software4) Make Sure Your Employees Know The Risks and What to Look Out For5) Opt For 2-Step Authentication6) Install On Site Security Cameras To Get A Look At Possible Perps7) Human Oversight Must Be Part of A Good Defense8) Test Your System Regularly

Tue, 29 Nov 2016 11:57:00 -0500

The threat of hackers and cyber-criminals is very real, for large companies and small businesses alike. That means a strong cyber-defense system is critical in the modern business world.

Marc Ackerman and Elliot Bohm (pictured) generated $95 million in revenue last year with their used gift card platform, CardCash. They don't even have access to their customers credit card info, relying instead on PayPal to handle payment processing. Says Bohm: "It’s best just to outsource it to a company that does it well, and you just have to focus on your business and not on other things which could be a distraction and could just cost you a lot of money and you’ll never be able to do a good job at anyway.”

Kevin Stecko, founder of 15 year-old online apparel shop 80sTees.com, got hacked in 2012 by thieves who accessed his customer's data. He now uses order management platform, Order Motion, and ecommerce platform Shopify. “These are companies that process billions of dollars of transactions, and therefore have the capability to hire much smarter people who are focused on security.”

It may seem like a no-brainer, but having a basic shield against incoming threats and breach attempts is key. Don't settle for free or Lite versions of security software to protect you from email and site-based malware; go pro, even if it means spending a little bit of money.

The people who work for you could well be a weak link in your defense against hackers and thieves, says Scott Schober, head of Berkeley Varitronics Systems. “Whether this a two-person business or a 40, 50 or 100-person small company or even larger, having trained personal that are security-conscious is extremely important.” Workers need to know what to look out for so they aren't fooled by malware-infected emails or tricked into disclosing passwords.

It may be irritating to have to punch in one extra pass code before logging into your work station for the day, but 2-step authentication is a great way to add one more layer of protection to your company's system and all its peripheral devices.

Though they're not wired directly into the online systems you are trying to protect, on-site security cameras can be great for getting a look at who is accessing your company's server rooms--and who is parking outside your office attempting to hack into your wireless internet routers.

It's all well and good to buy fancy security software and outsource data protection to people better at it than you, but someone in your organization has to be able to look at security reports and make sure things are working as they should. Says Bohm: “Never have too much faith in your technology."

The best way to make sure your cyber defenses are working is to test them. The best way to do that is to pay professional security experts to try and hack your system. After being hacked by a cyber-thief who stole $65,000, Berkeley Varitronics CEO Scott Schoper spent $50,000 to beef up his security and is a strong proponent of penetration-testing. “Testing everything – from A to Z – to find out where your weaknesses and vulnerabilities are[...]


Media Files:
http://specials-images.forbesimg.com/imageserve/559eb7fde4b05c2c3431c6d6/0x600.jpg?fit=scale&background=000000




$18B Jabil Circuit's Digital Transformation Inside And Outside The Company

Tue, 29 Nov 2016 11:52:00 -0500

Jabil Circuit is an $18 billion revenue provider of electronic manufacturing services. In the past few years, it is undertaken a digital transformation inside the company and with the company's customers. This transformation has yielded a variety of lessons for others to leverage.



The San Francisco Rail Ransomware Rogue Has Been Hacked... Twice

Tue, 29 Nov 2016 09:35:00 -0500

Two hackers have targeted the ransomware pusher who took control of Muni transport systems in San Francisco this weekend. They've exposed a significant criminal operation.


Media Files:
http://specials-images.forbesimg.com/imageserve/8dbd508a42bd41fc9fb8d068a9c97ada/0x600.jpg?fit=scale




Connected Medical Devices Cause Cybersecurity Blues

Tue, 29 Nov 2016 09:23:00 -0500

In theory, the Internet of Things should allow patients and providers to take unprecedented control of health care. In practice, it is shaping up to be a security nightmare. Earlier this month,Johnson & Johnsonnotified114,000 patients of a security hole in its Animas One Touch Ping connected insulin pump. Although the company [...]


Media Files:
http://specials-images.forbesimg.com/imageserve/38531574/0x600.jpg?fit=scale




Homeland Security Chief Cites Phishing As Top Hacking Threat

Tue, 29 Nov 2016 08:30:00 -0500

Learning how to spot a phishing email might just be the most important thing you can do to protect yourself online. Though phishing attacks have been around for decades, they're more dangerous today than ever before.


Media Files:
http://blogs-images.forbes.com/leemathews/files/2016/11/gmail.jpg?width=0&height=600