Learn how to improve your online security skills by reading Ronald Nutter’s new book “The Hackers Are Coming.” This online security expert will help you choose the best password management and two-factor authentication tools. These tools won’t keep breaches like the one at Yahoo from happening, you’ll need daily vulnerability scanning to even have a […]
Tips During Cybersecurity Awareness Month
No matter what type of online business you do, all websites warrant some level of cybersecurity scrutiny. Spend some time during Cybersecurity Awareness Month thinking about what you need to do to make yourself less vulnerable to attack as you use the Internet. Passwords Changing passwords and making sure that you don’t use the same […]
Acer Data Breach: 34,500 Shoppers Affected
The shocking Acer data breach was caused by the company “inadvertently” storing consumer data in an unsecured format. The Acer data breach compromised the information of nearly 34,500 Acer online shoppers. This is what the company reportedly told PCWorld only days after Yahoo! announced the security breach of millions of records in 2014. As a result, a hacker […]
500 Million Yahoo! Accounts Were Compromised
Yahoo! has admitted to a 2014 hack that left data of 500 million users exposed and compromised. The company blamed an unnamed nation for the hack. Based on an ongoing investigation, Yahoo! believes that the information associated with 500 million user accounts was stolen. However, the investigation has found no evidence that the state-sponsored actor […]
Understanding the DoC’s NIST Cyber Security Framework
The Department of Commerce Provides Website Owners with High-Level Security Guidelines The DoC issued the NIST Cyber Security Framework in February 2014. NIST stands for National Institute of Standards and Technology. Its framework organizes security around five functions: Identify, Protect, Detect, Respond, and Recover. These represent the high-level activities that help organizations make sound decisions around risk/threat […]
New Ransomware Could Post Your Personal Data Online
A new strain of ransomware called “Cry” encrypts data with its .cryextension. It harvests your location data from Google Maps and pasting it as an image onto imgur.com. A lot of ransomware variants simply send the victim’s information directly to the attacker’s Command and Control (C&C) servers. Cry, however, uses Portable Network Graphic (PNG) image […]
Seven Deadly Sins of Cyber Security
David Blumberg, Founder and Managing Partner at Blumberg Capital, takes a look at the seven deadly sins of cyber security. Those of us involved professionally with cyber security know that the underbelly of the Internet is a treacherous and ever-shifting domain where menacing actors motivated by the most basic human vices threaten us all. It is […]
The Ten Most Common Online Security Vulnerabilities (Part 2)
As discussed in Part 1 or this blog post, too many companies wait until after a data breach has occurred until online security becomes a priority. With daily instances of small and large-scale hacks, it’s odd that many still maintain the “it won’t happen to me” attitude until it happens to them. An effective approach to […]
The Ten Most Common Online Security Vulnerabilities (Part 1)
For all too many online companies, it’s not until after vulnerabilities have been located and a data breach has occurred that website security becomes a priority. With daily instances of small and large-scale hacks, it’s odd that many still maintain the “it won’t happen to me” attitude until it happens to them. An effective approach […]
China Launches Hack-Proof Satellite
As soon as you say the words “hack-proof satellite” you know that some veteran hackers are going to get together and try to prove you wrong. But, at least for a few years, the assertion from the Chinese that their communication satellite is unhackable may be right. In an effort to help develop an unhackable […]