Trust Guard Blog

Goodbye Hackers! Hello Sales!

  • Home
  • Features
  • Commentary
  • News
  • Get Started

Is Your Mobile App Hack Proof – Part Two

September 26, 2016 By James Wales Leave a Comment

Is Your Mobile App Hack Proof – Part Two

In Part One of this article we discussed the first category of potential binary risks associated with hack proof mobile apps. A hack exposes a company to significant economic, legal and reputational risks. The impact of not having a hack proof app can be devastating and all-encompassing. I know it’s difficult as an app developer […]

Filed Under: Commentary Tagged With: binary protection, Binary Risks, cyber-security, hack-proof, hackers, vulnerabilities

Is Your Mobile App Hack Proof? Part One

September 26, 2016 By James Wales Leave a Comment

Is Your Mobile App Hack Proof? Part One

Are you afraid that after everything you’ve done to build your app that it might not be hack proof? A hack can expose a company to serious risks and the negative impact can be devastating. Imagine having your mobile health app reprogrammed to instruct you to deliver a lethal dose of medication. If it isn’t hack […]

Filed Under: Commentary Tagged With: binary protection, Binary Risks, cyber-security, hack-proof, hackers, mobile app security, vulnerabilities

500 Million Yahoo! Accounts Were Compromised

September 24, 2016 By James Wales Leave a Comment

500 Million Yahoo! Accounts Were Compromised

Yahoo! has admitted to a 2014 hack that left data of 500 million users exposed and compromised. The company blamed an unnamed nation for the hack. Based on an ongoing investigation, Yahoo! believes that the information associated with 500 million user accounts was stolen. However, the investigation has found no evidence that the state-sponsored actor […]

Filed Under: Features, News Tagged With: cyber attacks, cyber-security, data security, reputation, website security, Yahoo!

Hackers Planning to Take Down the Internet

September 16, 2016 By James Wales Leave a Comment

Hackers Planning to Take Down the Internet

Hackers are planning one of their most advanced cyber attacks ever to take down the internet. Renowned online security expert Bruce Schneier has warned that hackers have stepped up cyber attacks against the key organizations whose job it is to keep the internet online. These sophisticated cyber attacks are part of a campaign to cause […]

Filed Under: News Tagged With: cyber attacks, cyber-security, DDoS Attacks, hackers

Understanding the DoC’s NIST Cyber Security Framework

September 14, 2016 By James Wales Leave a Comment

Understanding the DoC’s NIST Cyber Security Framework

The Department of Commerce Provides Website Owners with High-Level Security Guidelines The DoC issued the NIST Cyber Security Framework in February 2014. NIST stands for National Institute of Standards and Technology. Its framework organizes security around five functions: Identify, Protect, Detect, Respond, and Recover. These represent the high-level activities that help organizations make sound decisions around risk/threat […]

Filed Under: News, Trust Guard Tagged With: cyber-security, data security, hack-proof, hackers, national security, website security

Google to Warn Consumers of Unsafe Websites

September 12, 2016 By James Wales Leave a Comment

Google to Warn Consumers of Unsafe Websites

Chrome will explicitly mark web pages as unsafe if they use HTTP for transmitting sensitive data starting January 2017. Google has a goal to make the internet a safer place for everyone. It will soon start publicly shaming unsafe websites. Beware if you fail to use the HTTPS protocol for transmitting passwords and other sensitive data. […]

Filed Under: News, Trust Guard Tagged With: cyber-security, Google, security warnings, SSL Certificates, unsafe websites

New Ransomware Could Post Your Personal Data Online

September 12, 2016 By James Wales Leave a Comment

New Ransomware Could Post Your Personal Data Online

A new strain of ransomware called “Cry” encrypts data with its .cryextension. It harvests your location data from Google Maps and pasting it as an image onto imgur.com. A lot of ransomware variants simply send the victim’s information directly to the attacker’s Command and Control (C&C) servers. Cry, however, uses Portable Network Graphic (PNG) image […]

Filed Under: News, Trust Guard Tagged With: cyber-security, data security, hackers, malware, ransomware, vulnerabilities

Seven Deadly Sins of Cyber Security

September 5, 2016 By James Wales Leave a Comment

Seven Deadly Sins of Cyber Security

David Blumberg, Founder and Managing Partner at Blumberg Capital, takes a look at the seven deadly sins of cyber security. Those of us involved professionally with cyber security know that the underbelly of the Internet is a treacherous and ever-shifting domain where menacing actors motivated by the most basic human vices threaten us all. It is […]

Filed Under: Features, Trust Guard Tagged With: cyber-security, data security, hackers, vulnerabilities

The Ten Most Common Online Security Vulnerabilities (Part 2)

August 26, 2016 By James Wales Leave a Comment

The Ten Most Common Online Security Vulnerabilities (Part 2)

As discussed in Part 1 or this blog post, too many companies wait until after a data breach has occurred until online security becomes a priority. With daily instances of small and large-scale hacks, it’s odd that many still maintain the “it won’t happen to me” attitude until it happens to them. An effective approach to […]

Filed Under: Trust Guard Tagged With: cyber-security, data security, malware, vulnerabilities, website security

The Ten Most Common Online Security Vulnerabilities (Part 1)

August 26, 2016 By James Wales Leave a Comment

The Ten Most Common Online Security Vulnerabilities (Part 1)

For all too many online companies, it’s not until after vulnerabilities have been located and a data breach has occurred that website security becomes a priority. With daily instances of small and large-scale hacks, it’s odd that many still maintain the “it won’t happen to me” attitude until it happens to them. An effective approach […]

Filed Under: Trust Guard Tagged With: cyber-security, data security, hackers, malware, vulnerabilities, website security

  • « Previous Page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • Next Page »

Popular

PCI Compliance: What You Need to Know to Protect Your Business

PCI Compliance: What You Need to Know to Protect Your Business

4 Business Lessons from the Game of Thrones

4 Business Lessons from the Game of Thrones

Do Your Home Appliances Collect Personal Data?

Do Your Home Appliances Collect Personal Data?

What Potatoes Can Teach Us About Security

What Potatoes Can Teach Us About Security

Categories

  • Commentary
  • emailpromo
  • Features
  • News
  • Popular
  • Trust Guard

About · Contact Us · Get Started
Copyright © 2022 · Trust Guard