As computer networks become more complex, they become more vulnerable to hackers. These weak points can take the form of hardware, operating system bugs, software and users who don’t adhere to security policies. One of the best ways to uncover them is to get a hacker to break in. What is Penetration Testing? It’s essentially… Read More »
How Can You Fight Big Wireless Carrier Cramming?
Today, Sprint and Verizon announced that they will collectively pay out $158 million to settle customer cramming complaints. AT&T recently paid out too. But what is “cramming” and how can you be sure you are safe from it? Cramming is the term for adding an unauthorized charge on your phone bill. It’s most common on… Read More »
White House Breached
On October 29th, White House spokesman Josh Earnest confirmed an attack on computer systems used by top aids. The actual attack happened several weeks before the announcement, and the White House has released few details on the attack. Anonymous sources told the Wall Street Journal the attack was detected by an unnamed ally that passed… Read More »
The Battle Over Digital Payments at the Cash Register
Apple has launched their their new digital wallet service, but not all North American retailers are on board with the new service. Retailers that are members of the Merchant Customer Exchange (MCX) organization are developing an alternative based around an app that uses visual QR codes. The app is called CurrentC, and is currently in… Read More »
Is Chinese Government Behind Apple iCloud Attacks?
The October 17th launch of the iPhone 6 in China was overshadowed by a hack attack aimed at stealing Chinese users’ iCloud login information. Less than 24 hours after the release of the highly-anticipated smartphone, anti-censorship advocates in China tweeted about the attack. On the 20th they posted more information on a blog at greatfire.org accusing… Read More »
Has Apple Pay Put An End To Credit Card Security Issues?
All across America today, retailers have begun to accept Apple Pay purchases using secure encryption, Touch ID and Apple iPhones. So is cash still king or have we crowned a new form of payment winner? Apple’s new smartphones and iPads use an NFC wireless module to communicate to a merchant’s payment terminal. Once connected, a… Read More »
Cybersecurity Insurance & What You Need To Know
Every company that uses computers or the Internet needs to protect their assets, but how can companies prepare for threats that are so new they’re not even recognized? New technology can open security holes that aren’t detected until after cyber criminals have already broken in. Hackers develop new viruses and other malware every day, faster… Read More »
J.P. Morgan Chase Breach Affecting Up To 83 Million Accounts
It seems every few weeks, another organization announces a big data breach putting their customers at risk. This time it’s the largest bank in the United States. J.P. Morgan Chase announced a breach on August 27th, but initially believed the number of compromised accounts was much smaller. It wasn’t until October 2nd that they revealed 76 million… Read More »
- « Previous Page
- 1
- …
- 15
- 16
- 17
- 18
- 19
- …
- 22
- Next Page »