
In a 2012 episode of the TV drama “Homeland,” the Vice President of the United States was assassinated by hackers who tapped into his pacemaker and ramped up the speed of his heart until he had a heart attack. Sounds…
In a 2012 episode of the TV drama “Homeland,” the Vice President of the United States was assassinated by hackers who tapped into his pacemaker and ramped up the speed of his heart until he had a heart attack. Sounds…
Cybercrime continues to grow at alarming rates. Not only are cybercrime attacks up, the level of sophistication of cybercriminals continues to increase. A new report from ThreatMetrix provides details on the continuing growth in cyber threats. ThreatMetrix monitors digital attacks.…
We’ve written before about how employees are often the weakest link in data security. Most data breaches involving employees are cases where the employee was either ignorant or careless. Employees are often lazy with passwords (choosing simple ones, reusing passwords,…
Chinese hackers were recently charged with making millions of dollars conducting illegal insider trading. This case highlights the exposure law firms may face for lax data security. The US Attorney for the Southern District of New York, Preet Bharara, issued…
MarkMonitor, a San Francisco-based cybersecurity firm, conducted a cybercrime survey of over 3,400 European adults. The results are eye-opening. 45% of the respondents – nearly half – had been the victim of some sort of cybercrime. 20% of that 45%…
Yahoo recently discovered that it was the victim of what could be the largest-yet theft of personal data. According to the Wall Street Journal, Yahoo’s blaming “state-sponsored” hackers for the attack. Yahoo didn’t reveal which foreign country was allegedly involved.…
Apple devices are widely seen as being more secure than Windows and Android-based devices. As reported by Forbes, Apple has long claimed that iOS architecture has “built-in security features” and thus Apple owners don’t need separate anti-virus protection: iPhone, iPad,…
We’ve written a few posts in the past about how people are the weak link in most data security systems – see, for example, “Human Factors Data Security Threats,” and “For Data Security, Employees Are the Weakest Link.” Banks have…
Nobody’s really sure how to define “big data,” but everyone agrees that it’s a big deal. The first documented use of the term was in a 1997 paper by NASA scientists. The Oxford English Dictionary (OED) defines it (not very…
Many of our politicians in both the House and Senate are outraged that Apple didn’t want to create a backdoor to the iPhone, so they are pushing for new laws that would effectively ban end-to-end encryption. One Congressman, Ted Lieu,…