A couple of years ago when some 40 million credit cards were breached at Target's brick-and-mortar stores, I frantically tried to recall if I had done any holiday shopping at my neighborhood store. Thankfully I hadn't, but my relief was short-lived.
In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60 percent over the previous year. There will be 10 billion IoT devices connected to the Internet this year.
The man-in-the-middle attack is a tricky one for consumers because most of the time victims don't even know they've been hacked. It's a silent attack and hard to detect unless you know what you're looking for.
I was shocked to learn that my U.S. Senator, Johnny Isakson, made the list. Could the legislator, one of the most respected members of the Senate and the state of Georgia, be a secret Klansman?
The meeting point for hackers and mothers is like a mirror. The outward-bound reflection is where they intersect. Both are interested in what is revealed by a hack or sneak attack, but for the opposite reason.
We live in a time when databases have started to include a terrifying amount of extremely intimate information about illnesses, diagnoses, treatments and health issues that nobody should have to fear might become reading material for criminals or their customers.
As much as possible, never use simple passwords or, worse, use the same one on all of your accounts. Even if they are complicated, some websites have less security in protecting passwords. It is hard to memorize many passwords, but this is for your own good and the protection of your identity.
Cyberweaponry requires cyberdeterrence and new types of internet shields. Major U.S. corporations spend millions repairing damage from cyber infiltration, but devote hardly any resources to assessing potential risk sources and pre-emptive mitigation.
Increasingly, the virtual world of the Internet is converging with the physical world through the Internet of Things. As more physical devices connect to the Internet, hackers' reach and breadth expands exponentially. Today, Internet-enabled devices include TVs, home security systems, kitchen appliances, thermostats, and more.
Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.
The scarlet letter as a form of punishment is back, it's just not written in red anymore; it's written in Tweets, and Facebook posts, and blogs, and shares. Only it's even worse, because the punishment can be permanent -- you can never take it off.
The hack of AshleyMadison.com has been a wakeup call to many Americans that there's no such thing as a "safe" secret on the web -- but it should also be a wake-up call to another important group: the 28 million small businesses scattered across the U.S.
The OPM hack put them even further ahead by identifying 21 million American adults that have applied to work for the Federal government. No doubt espionage for China will remain the primary use for this data, but just as we update our view of identity in the 21st century so too might the PRC update its plans the use of such data.
As cars continue to rely on computers to increase capabilities, it leaves open to the possibility that any car can be hacked. A simple malware program in a car's software can cause havoc on the roads and ultimately take the lives of many people.
In the case of the Ashley Madison leak, the public doesn't seem to care much about the gravity of the crime and the long-term consequences of the hack. The victims are cheaters, mostly male, and they deserve it all. It's a poetic karma in full force, right? Wrong, I say.
In the real world, hacking gets a bad name, what with it being immoral (except in rare, delightful instances) and illegal. But in the world of cinema, it's a whole 'nother ballgame.