In Part One of this article we discussed the first category of potential binary risks associated with hack proof mobile apps. A hack exposes a company to significant economic, legal and reputational risks. The impact of not having a hack proof app can be devastating and all-encompassing. I know it’s difficult as an app developer […]
Is Your Mobile App Hack Proof? Part One
Are you afraid that after everything you’ve done to build your app that it might not be hack proof? A hack can expose a company to serious risks and the negative impact can be devastating. Imagine having your mobile health app reprogrammed to instruct you to deliver a lethal dose of medication. If it isn’t hack […]
500 Million Yahoo! Accounts Were Compromised
Yahoo! has admitted to a 2014 hack that left data of 500 million users exposed and compromised. The company blamed an unnamed nation for the hack. Based on an ongoing investigation, Yahoo! believes that the information associated with 500 million user accounts was stolen. However, the investigation has found no evidence that the state-sponsored actor […]
Hackers Planning to Take Down the Internet
Hackers are planning one of their most advanced cyber attacks ever to take down the internet. Renowned online security expert Bruce Schneier has warned that hackers have stepped up cyber attacks against the key organizations whose job it is to keep the internet online. These sophisticated cyber attacks are part of a campaign to cause […]
Understanding the DoC’s NIST Cyber Security Framework
The Department of Commerce Provides Website Owners with High-Level Security Guidelines The DoC issued the NIST Cyber Security Framework in February 2014. NIST stands for National Institute of Standards and Technology. Its framework organizes security around five functions: Identify, Protect, Detect, Respond, and Recover. These represent the high-level activities that help organizations make sound decisions around risk/threat […]
Google to Warn Consumers of Unsafe Websites
Chrome will explicitly mark web pages as unsafe if they use HTTP for transmitting sensitive data starting January 2017. Google has a goal to make the internet a safer place for everyone. It will soon start publicly shaming unsafe websites. Beware if you fail to use the HTTPS protocol for transmitting passwords and other sensitive data. […]
New Ransomware Could Post Your Personal Data Online
A new strain of ransomware called “Cry” encrypts data with its .cryextension. It harvests your location data from Google Maps and pasting it as an image onto imgur.com. A lot of ransomware variants simply send the victim’s information directly to the attacker’s Command and Control (C&C) servers. Cry, however, uses Portable Network Graphic (PNG) image […]
Seven Deadly Sins of Cyber Security
David Blumberg, Founder and Managing Partner at Blumberg Capital, takes a look at the seven deadly sins of cyber security. Those of us involved professionally with cyber security know that the underbelly of the Internet is a treacherous and ever-shifting domain where menacing actors motivated by the most basic human vices threaten us all. It is […]
The Ten Most Common Online Security Vulnerabilities (Part 2)
As discussed in Part 1 or this blog post, too many companies wait until after a data breach has occurred until online security becomes a priority. With daily instances of small and large-scale hacks, it’s odd that many still maintain the “it won’t happen to me” attitude until it happens to them. An effective approach to […]
The Ten Most Common Online Security Vulnerabilities (Part 1)
For all too many online companies, it’s not until after vulnerabilities have been located and a data breach has occurred that website security becomes a priority. With daily instances of small and large-scale hacks, it’s odd that many still maintain the “it won’t happen to me” attitude until it happens to them. An effective approach […]
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- Next Page »