Trolls and hackers are similar to each other in several ways. Both species are annoying and enjoy causing problems. I’m not talking about the trolls that try to upset everyone in online forums with rude and obnoxious posts. Although, who’s to say that that’s not how hackers spend their free time. Here are five ways […]
Websites are Like Banks with Unlocked Windows
Even in today’s world of secure video technology, there are still banks that get robbed every so often. But usually, it’s not because of carelessness. In addition to other security precautions, for example, banks usually lock their windows. E-commerce websites need to be just as secure as offline banks. The problem is, many online business […]
Hackers Are Bullies!
There has been a ton of emphasis on bullying lately. Many good-hearted people are attempting to remove it permanently from the schools. With so much focus, it’s a wonder we haven’t discussed the role that hackers play as bullies. We often hear about the abuses they’ve performed on big, strong companies like Yahoo, Google, Best […]
The Top Three PCI Compliance Mistakes
The truth is that most business owners misunderstand PCI compliance and website security in general. That’s why mistakes – avoidable mistakes – are made. The result is significant economic, legal and reputational problems. Some online businesses get hacked just when they start producing revenue. Others have their websites compromised when they’re making millions. Regardless, it’s […]
New Book Says “The Hackers are Coming!”
Learn how to improve your online security skills by reading Ronald Nutter’s new book “The Hackers Are Coming.” This online security expert will help you choose the best password management and two-factor authentication tools. These tools won’t keep breaches like the one at Yahoo from happening, you’ll need daily vulnerability scanning to even have a […]
Tips During Cybersecurity Awareness Month
No matter what type of online business you do, all websites warrant some level of cybersecurity scrutiny. Spend some time during Cybersecurity Awareness Month thinking about what you need to do to make yourself less vulnerable to attack as you use the Internet. Passwords Changing passwords and making sure that you don’t use the same […]
Acer Data Breach: 34,500 Shoppers Affected
The shocking Acer data breach was caused by the company “inadvertently” storing consumer data in an unsecured format. The Acer data breach compromised the information of nearly 34,500 Acer online shoppers. This is what the company reportedly told PCWorld only days after Yahoo! announced the security breach of millions of records in 2014. As a result, a hacker […]
Is Your Mobile App Hack Proof – Part Two
In Part One of this article we discussed the first category of potential binary risks associated with hack proof mobile apps. A hack exposes a company to significant economic, legal and reputational risks. The impact of not having a hack proof app can be devastating and all-encompassing. I know it’s difficult as an app developer […]
Is Your Mobile App Hack Proof? Part One
Are you afraid that after everything you’ve done to build your app that it might not be hack proof? A hack can expose a company to serious risks and the negative impact can be devastating. Imagine having your mobile health app reprogrammed to instruct you to deliver a lethal dose of medication. If it isn’t hack […]
New Ransomware Could Post Your Personal Data Online
A new strain of ransomware called “Cry” encrypts data with its .cryextension. It harvests your location data from Google Maps and pasting it as an image onto imgur.com. A lot of ransomware variants simply send the victim’s information directly to the attacker’s Command and Control (C&C) servers. Cry, however, uses Portable Network Graphic (PNG) image […]