BVS CEO & Cyber Security Expert, Scott Schober provides security details on Inside Edition Last week’s leak of confidential celebrity photos has focused renewed public attention on the security risks of storing data in the cloud. The photos were originally posted on a seedy Internet site by an anonymous user, then reposted to other disreputable… Read More »
‘Backoff’ Retail Malware Threat Even Worse than Expected
Just a few weeks ago the Department of Homeland Security issued a warning to retailers about Backoff, the point-of-sale malware responsible for the massive payment card security breach at Target during last year’s holiday season. The initial report indicated up to 600 retailers were affected, but on August 22nd the DHS issued another advisory that… Read More »
Car Remote Key Fobs Prove Vulnerable to Hackers
WATCH VIDEO HERE Remote door locks are a convenience to the driver, but they could also offer thieves a convenient way to break in. When you press a button on your car’s key fob, it uses radio waves to send a series of codes to a receiver inside the vehicle. If the codes match, the… Read More »
5 Security Tips To Stay Safe From Russian Hackers
On August 5th the New York Times announced the largest known theft of online login credentials. A group of Russian cyber criminals has amassed stolen usernames and passwords from over 1.2 billion accounts and 524 million email addresses. The data was uncovered in an 18-month investigation by a Milwaukee-based company called Hold Security. According to… Read More »
Homeland Security Warns of Retail Malware Threat
As banks and financial institutions have become harder to break into, cyber criminals have increasingly turned to targeting retail operations. According to an advisory issued last week by the DHS, the malware family known as Backoff has been identified in three forensic investigations of large-scale Point-of-Sale (POS) data breaches. The malware reads credit and debit… Read More »
Wiping Your Old Android Device Isn’t Enough
The average user’s upgrade cycle for smartphones and tablets is around two years. If the old device is still in good shape once the user upgrades, individual users and small businesses usually sell it or pass it along to someone else. Big companies send obsolete devices to companies that specialize in recycling end-of-life electronics.… Read More »
Think only the military has drones? Think again.
Just a few years ago, only militaries and government agencies had access to sophisticated drones, but today anyone can buy them for just a few hundred dollars. The basic hardware has been around for decades in the form of remote-controlled helicopters. Today drone operators can equip them with high-definition cameras, Wi-Fi detection tools and other… Read More »
4 Simple Ways to Keep Your Business Secrets Safe
Governments have been using cyber espionage to spy on one another almost as long as the Internet has been around. Likewise, cyber crime is nothing new. Until relatively recently, the two were distinct. Governments stole military secrets from other governments, and criminals stole money from banks and private enterprises. Now the two have come together.… Read More »
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- Next Page »