There are many facets surrounding the arrest of 21 year old Air National Guardsman, Jack Tiexeira, that would suggest run-of-the-mill hacking, but that would be misguided. So what went wrong in the chain of security that led to such a massive breach by such an inexperienced and alleged traitor to the intelligence community? We’ve… Read More »
Gift ‘Carding’ Not as Nice as Sounds
What do you get for the person that has everything? Gift cards, while impersonal, do make gifting easy for those of us that are too busy or disinclined to search for that perfect gift. Hackers have gotten into the act of ‘carding’ but not like you think. What is Carding? Carding is when a stolen… Read More »
Uber is Equifax of Ridesharing
Cybersecurity journalism is a lot like the movies; you need a great villain to get the audience’s attention. Here comes Uber to the rescue of Equifax by knocking them off the top spot on the villains list. This week, Bloomberg revealed a ransom payout from Uber to keep hackers silent. Uber is no stranger to… Read More »
Breach Recovery Checklist For You and Your Company
No business nor individual is immune to a cyber breach yet I still hear many people telling me they don’t think they will be affected. They believe that their company does not have anything valuable enough to steal, but every company and individual have valuable data to a cyber thief that we might overlook. While… Read More »
Can There Be Too Much Big Data?
Can There Be Too Much Big Data? Big data hype is only matched by its actual growth. Experts are predicting a 4300% increase in annual data production by 2020. In 2013, there were 3.9 billion email accounts generating oodles of data which will grow to 4.9 billion by the end of 2017. Big data is here to… Read More »
Yahacked: Biggest hack in history
Yahacked!: Biggest hack in history One of the original Internet darlings, Yahoo, has had a rough decade. After many stalled buyout attempts and further devaluations thanks to lackluster IPs like Tumblr, Yahoo has finally regained stability as part of a $4.8 billion purchase by Verizon…until now. Of what is believed to be the largest breach in history, Yahoo has… Read More »
Brand Hacking: The Sting of a Cyber-breach
Brand Hacking: The Sting of a Cyber-breach Brand is a powerful thing. When consumers buy something from a company, they are paying for the image and brand as much as the product itself. Trillions of dollars are spent every year in sales and marketing efforts to create effective brands that sell. This cannot happen overnight… Read More »
I Have Trust Issues With Tech Companies
I Have Trust Issues With Tech Companies In light of the recent LinkedIn acquisition by Microsoft, I started to think (worry) about the current line-up of top tech companies. All of them collect, use and “sell” our data in varying degrees. Some are sneaky about it while others are bolder and more upfront. Some shy… Read More »
- 1
- 2
- 3
- 4
- Next Page »