Home Depot hasn't really told us much about their data breach so far, and for that, I say shame on them. One of the few things they did share though, and quite categorically, is that no debit card PINs were exposed in the breach.
co-authored by Dr. Stephen Bryen, Founder & CEO ZiklagSystems Something is wrong with Home Depot's explanation of the hack on the point of their cas...
By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app.
What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybercrime ring.
It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age.
Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into.
As the smoke clears from this latest attack on privacy and our collective sense of decency, it's becoming more and more likely that a deft use of personally identifiable information was used to unlock the nude celebrity photo troves that flooded the Internet.
If the Home Depot breach turns out to be as bad or worse than the Target breach, certain things will be unavoidable for the home improvement giant. But there are some things the company can do to help reduce the short and long term impact and cost.
It's our Internet, and if we don't take care of it, it won't take care of us.
If you are not particularly worried about being high-minded here, there is another consideration, which is, by looking at the pictures, you are giving criminals a purpose for their act (at least with a degree or so of separation) and causing someone distress. Is it really worth it?
I am a 'culture hacker'. It's a curious term that is often confused with computer hackers and other technologists whose activities oftentimes invite suspicion.
Enough with the data breach excuses already. Not only are they as jaded as the breaches themselves, they're often just not true. In the aftermath of almost every data breach, chances are you're only going to get a boilerplate public statement.
From the moment that my children had access to things like camera phones or laptops with webcams, I have had numerous conversations about how any photo you take can be shared, and anything that is shared can be seen by the entire world.
Many technology executives don't have a favorable outlook on their ability to sideswipe cybercriminals, according to research conducted by McKinsey and World Economic Forum.
It's easy, for instance, for a parent to access their child's name and Social Security number, then open up a phony account--even if the victim is literally a child. Most companies don't check the ages, so that's why this crime can go undetected for years.
You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats.