iOS app Android app


Healthcare Data under Attack

Robert Siciliano | Posted 07.06.2014 | Crime
Robert Siciliano

Crooks want your health information. Why? It’s called medical identity theft, and it’s not going away too soon. In fact, the ACA (Afford...

What Is Social Engineering?

Robert Siciliano | Posted 07.03.2014 | Technology
Robert Siciliano

No, it's not some new engineering field to develop social media sites. Social engineering has been around as long as the con artist has been around. The terms stems from the social science world where social engineering is deemed as an act of psychological manipulation.

13 Ways Protect Your Credit Cards From Fraud

Robert Siciliano | Posted 07.02.2014 | Crime
Robert Siciliano

Here are a number of ways you can protect your credit cards from fraud. 1. Keep a sharp eye on your credit card accounts. Read through the purchase...

Courts side with Consumers in Data Breach

Robert Siciliano | Posted 07.01.2014 | Business
Robert Siciliano

In general, courts don’t tend to side with consumers in data breach incidents. However, a federal court in Florida is the apple among the oranges. I...

The White House Wants A National Identity Ecosystem: A Bad Idea

Rebecca Abrahams | Posted 06.30.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, CTO Ziklag Systems Not wanting to be left out of the massive government surveillance business, the White House is p...

10 Unbelievable Identity Theft Cases

Robert Siciliano | Posted 06.30.2014 | Crime
Robert Siciliano

Here’s a countdown to the most incredible identity theft cases recorded, compiled by Dr. Gerald BarnesGerald Barnbaum lost his pharma...

Huge IE Attack: Will Microsoft fix It in Time while XP Users are Left to the Dogs?

Robert Siciliano | Posted 06.29.2014 | Technology
Robert Siciliano

If you have IE 6 through 11, watch out. There’s a glitch that enables hackers to exploit flaws in these systems. Microsoft is racing to fix this vul...

Phishing Alert: 10 Tips To Protect Your Business From Attacks

Robert Siciliano | Posted 06.29.2014 | Business
Robert Siciliano

It's becoming too easy for criminals to get their hands on your banking information, due to your employees' ignorance of phishing scams. Malware at...

Beef up Your Firm's Physical Security

Robert Siciliano | Posted 06.28.2014 | Crime
Robert Siciliano

Poor security can literally ruin your company - just ask the former Bitcoin giant MtGox. Handling around 70 per cent of the world's Bitcoin trades ...

Healthcare Records vulnerable to Criminals

Robert Siciliano | Posted 06.23.2014 | Crime
Robert Siciliano

Just about every kind of healthcare related entity—hospitals, rehab centers, pharma companies, insurance carriers and more—have been and continue ...

15 Small-Business Social Network Nightmares

Robert Siciliano | Posted 06.22.2014 | Small Business
Robert Siciliano

You may think you've guarded your company, but are your social media outlets unprotected? Look at these 15 potential weaknesses in your defense.

Data Brokers: What Are They; How to Get Control of Your Name

Robert Siciliano | Posted 06.21.2014 | Technology
Robert Siciliano

Ever hear of the term "data broker"? What do you think that is? Think about that for a moment. Yep, you got it: An entity that goes after your data and sells it to another entity.

Web Application Security Risks You Should Know About

Alex Ivanovs | Posted 06.17.2014 | Home
Alex Ivanovs

It's time to take a look at some of the most common security risks that we can experience within our web applications, and perhaps it's time we look into those risks at a much deeper level.

Financial Services and Retail band together to fight Fraud

Robert Siciliano | Posted 06.17.2014 | Business
Robert Siciliano

Finally, retailers and banks have agreed to work together to fight data breach incidents, foregoing the finger-pointing of who’s responsible for pre...

OpenSSL Vulnerability Hits the Web Unexpectedly

Alex Ivanovs | Posted 06.16.2014 | Home
Alex Ivanovs

Two thirds of all of the websites in the world use OpenSSL, this vulnerability would enable hackers (or anyone else for that matter) to exploit the cryptographic library and use that as a way of stealing information trough the SSL/TLS gateways.

This Earth Day, "Clean" Your Device Before You Recycle It

Robert Siciliano | Posted 06.16.2014 | Technology
Robert Siciliano

One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A ...

Protecting Your Business's Data From Organized Crime

Robert Siciliano | Posted 06.15.2014 | Business
Robert Siciliano

Organized crime rings are using brains, not brawn, to target small businesses and steal critical data. Protect your business by putting these 11 secur...

Heartbleed: Free Tool to Check if That Site Is Safe

Robert Siciliano | Posted 06.12.2014 | Technology
Robert Siciliano

I'm sure you've heard the news about Heartbleed by now (unless you're in vacation wonderland and have taken a tech break). This is a serious vulnerability in the core of the Internet and is something we all should be concerned about.

Investigating Heartbleed -- An Independent Commission Is Vital

Rebecca Abrahams | Posted 06.11.2014 | Technology
Rebecca Abrahams

But who can investigate the matter? This is a non-trivial question because the government is no longer trustworthy.

Gerry Smith

Controversial Hacker's Conviction Is Overturned | Gerry Smith | Posted 04.11.2014 | Technology

A federal appeals court on Friday overturned the conviction of Andrew "Weev" Auernheimer, reversing a verdict that was viewed as having a chilling eff...

Cyber Insurance vs. General Liability

Robert Siciliano | Posted 06.10.2014 | Business
Robert Siciliano

One of the biggest data breaches of all time involved that of Sony Corp. The hackers stole confidential information from tens of millions of Sony Play...

Turn Off Your TV and Build Something: An Interview with Mitch Altman

Alison Dorantes-Garcia | Posted 06.07.2014 | Huffpost Code
Alison Dorantes-Garcia

This week I had the pleasure of interviewing a well-known hacker and activist, Mitch Altman. Mitch is so well known among hackers, makers, and people ...

7 Lies You tell Yourself about Your Wifi

Robert Siciliano | Posted 06.04.2014 | Technology
Robert Siciliano

…think again, even if most of your wireless network activities revolve around your personal and family life. There are seven lies about wireless pro...

Insurance Company fined BIG for Breach

Robert Siciliano | Posted 06.03.2014 | Business
Robert Siciliano

Why would an insurance company be fined for a data breach? There was a security breach at Triple-S Salud, Inc. (TSS), which is a subsidiary of Trip...

How To Stop Criminal Hackers In Their Tracks

Robert Siciliano | Posted 06.01.2014 | Business
Robert Siciliano

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business. On a recent trip from Boston to New York o...