iOS app Android app

Hacking

Family Identity Theft Is Ugly

Robert Siciliano | Posted 08.29.2014 | Technology
Robert Siciliano

It's easy, for instance, for a parent to access their child's name and Social Security number, then open up a phony account--even if the victim is literally a child. Most companies don't check the ages, so that's why this crime can go undetected for years.

Best Way to Destroy a Computer Virus

Robert Siciliano | Posted 08.28.2014 | Technology
Robert Siciliano

You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats.

Russian Hackers Said to Loot Gigabytes of Big Bank Data

Bloomberg | Posted 08.28.2014 | Business

Russian hackers attacked JPMorgan Chase & Co. and at least four other banks this month in a coordinated assault that resulted in the loss of gigabytes...

Cybersecurity Insurance Still Requires Cybersecurity

Robert Siciliano | Posted 08.24.2014 | Technology
Robert Siciliano

OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced.

More Than 1,000 U.S. Retailers May Have Been Hacked

AP | ALICIA A. CALDWELL and JEFF HORWITZ | Posted 08.22.2014 | Business

WASHINGTON (AP) — More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hacker...

Before Getting Rid of Your Old Printer, Say 'Goodbye' to Lingering Data

Robert Siciliano | Posted 08.22.2014 | Technology
Robert Siciliano

Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and credit card numbers. But there are other devices that hold sensitive data that we don't really talk about. For example, printers.

Beware of the Lottery Scam

Robert Siciliano | Posted 08.19.2014 | Crime
Robert Siciliano

There's one born every minute. Many scammers use the names of valid lottery organizations, but this doesn't mean the legit entities are involved. The latest con is to tell someone they won a Powerball jackpot while planning on stealing their identity.

What Do I Need to Know and When Do I Need to Know It?

Brian E. Finch | Posted 08.14.2014 | Technology
Brian E. Finch

Another day, another big hack discovered. According to reports from the New York Times, the WSJ, and numerous other publications, a small group of cyber criminals based out of Russia were apparently able to collect around 1.2 billion usernames and passwords from more than 400,000 websites globally.

Healthcare Providers Gaining Trust by Marketing Security

Robert Siciliano | Posted 08.12.2014 | Business
Robert Siciliano

You’ve surely heard of “B2B” or business-to-business marketing. The new game plan is “B2C” – business to consumer ...

8 Ways to Bullet Proof Your Social Accounts

Robert Siciliano | Posted 08.12.2014 | Huffpost Code
Robert Siciliano

There are ways to keep the hackers at bay--for the most part, anyways, since no protection is 100 percent efficient.

Why a Cardless ATM Future Should Spark Excitement... And Worry

MyBankTracker | Posted 08.12.2014 | Money
MyBankTracker

The next time you withdraw cash out of an ATM, imagine what it would be like if you could do it without using a debit card. That might soon become rea...

What Computer Geeks Taught Me About the Future of Aging

Robyn Stone | Posted 08.08.2014 | Technology
Robyn Stone

Sometime in the near future, our nation may not have enough qualified workers to serve every older American who needs services and supports. That's more than a little scary, especially for baby boomers who are turning 65 at the rate of about 10,000 a day. I am one of those baby boomers. But I'm not scared anymore.

Data Breaches May Result in Board Breakups

Robert Siciliano | Posted 08.07.2014 | Business
Robert Siciliano

The ripple effect continues to haunt Target: It's expected that seven of its board of directors members may be replaced because they failed to provide effective oversight into the corporation's data-protection risks. Boards simply need to be more proactive in safeguarding their companies against data breaches

Cyber Security Insurance Difficult for Business to Navigate

Robert Siciliano | Posted 08.05.2014 | Business
Robert Siciliano

Cyber insurance is now booming, with about 50 carriers in the industry. An increasing number of companies have cyber insurance to protect against cyber crime. However, businesses claim it's not easy to get adequate coverage.

Business Identity Theft; Big Brands, Big Problems

Robert Siciliano | Posted 08.05.2014 | Business
Robert Siciliano

Cyber criminals go after brand names like vultures, infiltrating company websites, hijacking mobile applications and tainting online ads, among other tricks.

Healthcare Establishing Customer Security Programs

Robert Siciliano | Posted 08.04.2014 | Business
Robert Siciliano

Consumers really get stiffed when there's a data breach, having to change their passwords, replace credit cards, and other bothersome tasks, not to mention the grief over stolen personal information.

The if's, and's & Yo's of it

Marc Shifflett | Posted 07.31.2014 | Huffpost Code
Marc Shifflett

Yes, there was a Yo Hackathon.

Make Information Security a Priority

Robert Siciliano | Posted 07.30.2014 | Technology
Robert Siciliano

We all know that 123qwe is such an easy password to remember, especially if it's for all gazillion of your accounts. You know whom else finds this very convenient? Hackers!

Facebook Security for Parents and Teens

Robert Siciliano | Posted 07.28.2014 | Parents
Robert Siciliano

Facebook offers a hefty amount of security measures that parents and teens should know about. Here are a few highlights.

Malware Can Hide in the Most Obvious Places

Robert Siciliano | Posted 07.28.2014 | Technology
Robert Siciliano

You never know when malware will bite. Even browsing an online restaurant menu can download malicious code, put there by hackers.

Beware of Flight MH17 Facebook Scams

Robert Siciliano | Posted 07.23.2014 | Crime
Robert Siciliano

How low can scammers go? The latest is phony Facebook profiles that use identities of deceased victims of Malaysia Airlines Flight MH17 -- claiming th...

Six Mistakes to Avoid When Writing Code for the Internet of Things

Samuel Bucholtz | Posted 07.23.2014 | Home
Samuel Bucholtz

Companies like Intel, Google, Samsung, Microsoft, General Electric, Cisco, AT&T and IBM, which are already taking an active role in Internet of Things development, will soon be placing a greater emphasis on risk-mitigation with these products - and developers who can deliver on security, in addition to performance and UX, are likely to be a step ahead of the competition.

Phishing Alert: 8 Tips to Protect Yourself from Attacks

Robert Siciliano | Posted 07.22.2014 | Technology
Robert Siciliano

So many people fail to learn about phishing scams, a favorite and extremely prevalent scam among cybercriminals. A type of phishing scam is to lure the user onto a malicious website.

How to Prevent Summertime Scams

Robert Siciliano | Posted 07.21.2014 | Crime
Robert Siciliano

Summertime is here -- and that means sunshine and vacations. Most people love summertime, including scammers! Hackers can use this time to take advantage while we are planning vacations or on vacation or just enjoying fun in the sun. Here are some key scams to watch out for this summer.

Everything You Need to Know About a Credit Freeze

Robert Siciliano | Posted 07.17.2014 | Money
Robert Siciliano

A credit freeze locks down your credit report so lenders can't see your scores, making your credit/SSN useless to them because they don't know their risk level.