Ever hear of the term "data broker"? What do you think that is? Think about that for a moment. Yep, you got it: An entity that goes after your data and sells it to another entity.
When our forensics investigators are called to look into the cause of a data breach, the majority of the time the initial point of entry is tied to a weak password.
If the Heartbleed fiasco taught us anything, it's that there are myriad ways your company can be affected by security issues. Your HR department is vulnerable, too, and the most dangerous fallout comes increasingly from tax-related identity theft.
Sure, the NSA, CIA and FBI deserve scrutiny, but we should devote our attention to the private sector also. Outsourcing has always been a convenient way to avoid accountability.
For developers to succeed in the long term, Google must take action to clean up the Google Play store. Changes may slow down the app approval process, but most developers would welcome it if it also created an environment where consumers were more comfortable paying for apps.
It's time to take a look at some of the most common security risks that we can experience within our web applications, and perhaps it's time we look into those risks at a much deeper level.
Finally, retailers and banks have agreed to work together to fight data breach incidents, foregoing the finger-pointing of who’s responsible for pre...
The sheer amount of personal information we are generating and sharing online underscores some of the biggest security challenges we are currently facing. How do we control what this data is being used for?
Two thirds of all of the websites in the world use OpenSSL, this vulnerability would enable hackers (or anyone else for that matter) to exploit the cryptographic library and use that as a way of stealing information trough the SSL/TLS gateways.
One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A ...
After the alarming gap in one of the Internet's key security methods *Heartbleed* was announced, even organizations that have taken precautions ...
Organized crime rings are using brains, not brawn, to target small businesses and steal critical data. Protect your business by putting these 11 secur...
Since many websites ask you (or even require you) to use your email address as a username, that information is also vulnerable to the Heartbleed bug. Welcome to the beginning of phishing season.
I'm sure you've heard the news about Heartbleed by now (unless you're in vacation wonderland and have taken a tech break). This is a serious vulnerability in the core of the Internet and is something we all should be concerned about.
But who can investigate the matter? This is a non-trivial question because the government is no longer trustworthy.
So if you're in the midst of changing passwords, now's a good time to start a password system, rather than picking one new, universal password.