Fri, 2 Dec 2016 11:02:00 -0500Activists are concerned about the leak of a zero-day vulnerability by a government contractor, used to expose the identities of a Tor-based site.
Fri, 2 Dec 2016 10:34:00 -0500Fraudsters have been running Windows tech support scams for years. Recently, however, their tactics have become even more insidious.
Fri, 2 Dec 2016 09:12:00 -0500Bitcoin users and others could face IRS probes now that Coinbase records are in the IRS crosshairs. Be prepared.
Fri, 2 Dec 2016 07:00:00 -0500Photo by Mike Licht, NotionsCapital.com In a pair of recent essays, Timothy Edgar,the academic director of law and policy at Brown University's Executive Master in Cybersecurity program, has outlined the legal basis for how a President Donald Trump could potentially shut down the U.S. internet in response to a national [...]
Fri, 2 Dec 2016 03:07:00 -0500Enigma Software reports that malware infections during the four days from Black Friday to Cyber Monday more than doubled compared to the rest of November.
Thu, 1 Dec 2016 18:38:00 -0500Robert Knake, a cybersecurity expert with the the Council on Foreign Relations, has recently released a report calling for the creation of a federally sponsored cyber insurance program. The report argues: Anticipating a catastrophic event in cyberspace, Congress should put in place a federal backstop for cyber insurance. Doing [...]
Thu, 1 Dec 2016 17:08:00 -0500The activation lock feature Apple introduced when the iPhone 6 launched made the devices a lot less attractive to would-be thieves. But like a lot of physical locks, the software activation lock in iOS can be forced open if you know the right tricks.
Thu, 1 Dec 2016 13:42:00 -0500Terrorism is big business but when x-rays are mistaking peanut butter for explosive a better system is needed. A startup from the University of Helsinki just may stop 99% of bombs getting onto planes.
Thu, 1 Dec 2016 10:20:00 -0500David Willson, a retired Army officer, attorney and now owner of Titan Info Security Group, travels the country, educating CEOs and executives on how to protect their companies from data breaches, which have become increasingly common in recent years. His No. 1 piece of advice to companies: implement what he calls [...]
Thu, 1 Dec 2016 09:00:00 -0500CA Technologies announced today its intent to acquire Austria-based Automic Holding GmbH for approximately €600 million ($636 million). The respective boards of directors have approved the deal, which is expected to close by the end of March 2017.
Wed, 30 Nov 2016 20:52:00 -0500Infrastructure investment is on the forefront of political agendas around the world. This spotlight must also now be lifted above us to outer space, where new space industries are building, extending, and connecting a space-based infrastructure to the planet as never before.
Wed, 30 Nov 2016 15:37:00 -0500South Korea’s online banking infrastructure is a mutation of its own. Desktop users can only use PCs running Internet Explorer.
Wed, 30 Nov 2016 15:23:00 -0500Reports are circulating that more than a million Google users have had their credentials stolen by cybercriminals. Security experts believe the malware responsible is stealing 13,000 more passwords every day.
Wed, 30 Nov 2016 14:55:00 -0500What will a Trump presidency mean for cyberspace? Veteran investor and entrepreneur David Cowan argues it will mean the introduction of stop-and-frisk in cyberspace alongside deregulation that could prove dangerous for individual privacy as well as national security.
Wed, 30 Nov 2016 11:30:00 -0500Ranging from gift card scams and the sale of counterfeit goods to fake charities, here are some common ways fraudsters try to deceive consumers, especially during this celebratory time of the year.
Wed, 30 Nov 2016 08:59:00 -0500Android malware spreading fast and businesses' Google accounts are being compromised as well as individuals.
Wed, 30 Nov 2016 08:19:00 -0500By Robin Meyerhoff, Senior Director, Corporate Affairs, SAP On the corner of Moneda and Licenciado Primo Verdad streetsin Mexico City sits the first printing press in the Americas, established in 1539. Not far from that historic site of innovation is the Zona Rosa, one of many neighborhoods in the city [...]
Wed, 30 Nov 2016 06:00:00 -0500In a world where we have satellite radio, satellite TV, satellite internet service, GPS, and other services delivered to us from above its nice to know that someone is pushing this technology to make our lives better and to provide additional security for everyone. Recently, the European Data Relay System began [...]
Tue, 29 Nov 2016 20:01:00 -0500Even the most seasoned gamer knows not to tread lightly around a role-playing game's save point. Godspeed, Tom. Cartoon by Steve Napierski.
Tue, 29 Nov 2016 20:01:00 -0500
Tue, 29 Nov 2016 19:29:00 -0500With China’s passage this month of its Cyber Security Law (the “Law”; unofficial English translation on China Law Translate), much of the attention in the international business community has focused on how business obligations will change for mainland China operations and how the law will generally affect cross-border handling of [...]
Tue, 29 Nov 2016 19:23:00 -0500Finnish-based smartphone and software developer Jolla has announced that its mobile operating system, Sailfish OS, has been accepted as "the only mobile OS in Russia to be used in governmental and government controlled corporations’ upcoming mobile device projects."
Tue, 29 Nov 2016 17:09:00 -0500Users of the free adult website xHamster are being advised to change their passwords immediately. The reason: private data on 380,000 xHmaster users is being passed around on the Dark Web.
Tue, 29 Nov 2016 11:59:00 -0500Years ago, it took a lot of work to wrangle enough bots into a botnet to cause a serious amount of chaos. Today it's only as hard as tracking down the right seller on the Dark Web, even if you're after the most powerful Mirai botnet on the planet.
Tue, 29 Nov 2016 11:57:00 -0500"Nearly half of all companies don’t have security awareness training. That’s staggering and completely counterintuitive."
Tue, 29 Nov 2016 11:57:00 -0500
The threat of hackers and cyber-criminals is very real, for large companies and small businesses alike. That means a strong cyber-defense system is critical in the modern business world.
Marc Ackerman and Elliot Bohm (pictured) generated $95 million in revenue last year with their used gift card platform, CardCash. They don't even have access to their customers credit card info, relying instead on PayPal to handle payment processing. Says Bohm: "It’s best just to outsource it to a company that does it well, and you just have to focus on your business and not on other things which could be a distraction and could just cost you a lot of money and you’ll never be able to do a good job at anyway.”
Kevin Stecko, founder of 15 year-old online apparel shop 80sTees.com, got hacked in 2012 by thieves who accessed his customer's data. He now uses order management platform, Order Motion, and ecommerce platform Shopify. “These are companies that process billions of dollars of transactions, and therefore have the capability to hire much smarter people who are focused on security.”
It may seem like a no-brainer, but having a basic shield against incoming threats and breach attempts is key. Don't settle for free or Lite versions of security software to protect you from email and site-based malware; go pro, even if it means spending a little bit of money.
The people who work for you could well be a weak link in your defense against hackers and thieves, says Scott Schober, head of Berkeley Varitronics Systems. “Whether this a two-person business or a 40, 50 or 100-person small company or even larger, having trained personal that are security-conscious is extremely important.” Workers need to know what to look out for so they aren't fooled by malware-infected emails or tricked into disclosing passwords.
It may be irritating to have to punch in one extra pass code before logging into your work station for the day, but 2-step authentication is a great way to add one more layer of protection to your company's system and all its peripheral devices.
Though they're not wired directly into the online systems you are trying to protect, on-site security cameras can be great for getting a look at who is accessing your company's server rooms--and who is parking outside your office attempting to hack into your wireless internet routers.
It's all well and good to buy fancy security software and outsource data protection to people better at it than you, but someone in your organization has to be able to look at security reports and make sure things are working as they should. Says Bohm: “Never have too much faith in your technology."
The best way to make sure your cyber defenses are working is to test them. The best way to do that is to pay professional security experts to try and hack your system. After being hacked by a cyber-thief who stole $65,000, Berkeley Varitronics CEO Scott Schoper spent $50,000 to beef up his security and is a strong proponent of penetration-testing. “Testing everything – from A to Z – to find out where your weaknesses and vulnerabilities are[...]
Tue, 29 Nov 2016 11:52:00 -0500Jabil Circuit is an $18 billion revenue provider of electronic manufacturing services. In the past few years, it is undertaken a digital transformation inside the company and with the company's customers. This transformation has yielded a variety of lessons for others to leverage.
Tue, 29 Nov 2016 09:35:00 -0500Two hackers have targeted the ransomware pusher who took control of Muni transport systems in San Francisco this weekend. They've exposed a significant criminal operation.
Tue, 29 Nov 2016 09:23:00 -0500In theory, the Internet of Things should allow patients and providers to take unprecedented control of health care. In practice, it is shaping up to be a security nightmare. Earlier this month,Johnson & Johnsonnotified114,000 patients of a security hole in its Animas One Touch Ping connected insulin pump. Although the company [...]
Tue, 29 Nov 2016 08:30:00 -0500Learning how to spot a phishing email might just be the most important thing you can do to protect yourself online. Though phishing attacks have been around for decades, they're more dangerous today than ever before.