Obama’s Data Security Plan: Do As I Say, Not As I Do

Identity Theft

Obama’s Data Security Plan: Do As I Say, Not As I Do

Obama’s Data Security Plan: Do As I Say, Not As I Do

“If we’re going to be connected, then we need to be protected,” President Obama proclaimed at the Federal Trade Commission on Monday. In wide-ranging remarks, the president expressed what should be a self-evident truth, but is not yet a reality in the new digital age: “As Americans, we shouldn’t have to forfeit our basic privacy… Read More

5 Risky Things You’re Doing on Your Work Computer

Identity Theft

5 Risky Things You’re Doing on Your Work Computer

5 Risky Things You’re Doing on Your Work Computer

With technology driving business growth, more companies are implementing bring-your-own-device policies in the workplace. Almost two in three IT professionals believe employee carelessness is connected to major data breaches that exposed customer information, according to a study by IT security firm Check Point. With the risk of employees causing data breaches of customer and corporate information,… Read More

BlackEnergy: The Scariest Malware in America?

Identity Theft

BlackEnergy: The Scariest Malware in America?

BlackEnergy: The Scariest Malware in America?

Malicious software that researchers think has been used by hackers to attack critical infrastructure systems, such as trains and power plants in Ukraine and Poland, has been found in similar American systems, the U.S. government says. And while there is no sign hackers have used the software — called BlackEnergy — to wreak havoc by… Read More

What Is a ‘Data Breach’ Really?

Identity Theft

What Is a ‘Data Breach’ Really?

What Is a ‘Data Breach’ Really?

Data breaches. Vulnerabilities. These terms have entered our lexicon. But what exactly do they refer to? Recent news events show that we are in a period where the terminology we use to refer to security shortfalls is in flux. Target, Home Depot and JPMorgan Chase clearly suffered major data breaches. So did Apple’s iCloud, Dropbox… Read More

FBI Chief: China Has Hacked Every Major U.S. Company

Identity Theft

FBI Chief: China Has Hacked Every Major U.S. Company

FBI Chief: China Has Hacked Every Major U.S. Company

In a “60 Minutes” interview, Federal Bureau of Investigation Director James Comey bluntly answered questions about cybersecurity threats to the U.S. and its citizens. Perhaps his most shocking statement came on the topic of foreigners’ attempts at breaking digital security barriers: “I mean, there are two kinds of big companies in the United States. There… Read More

The All-Access Pass Hackers Love

Identity Theft

The All-Access Pass Hackers Love

The All-Access Pass Hackers Love

What do the Target hackers have in common with Edward Snowden? Both successfully breached highly protected networks to steal mountains of sensitive data by abusing privileged accounts. Privileged accounts are the logons that open access to desktops, laptops, servers, firewalls, databases, printers — pretty much any device with a microprocessor tied into a company network. For the… Read More

The Most Common Ways Our Data Is Breached

Identity Theft

The Most Common Ways Our Data Is Breached

The Most Common Ways Our Data Is Breached

Verizon’s 2014 Data Breach Investigations Report reveals that nine types of attacks are responsible for 92% of 100,000 incidents during the past 10 years.. The nine attacks are Web app attacks, cyber-espionage, point of sale intrusions, physical theft, crimeware, miscellaneous errors, and “everything else.” In 2013, the most common technique was the Web app attack, which accounted for… Read More

Show Me More