Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.

Smart business people know that they must secure their systems to withstand the most determined and persistent real-world, as well as cyber, attacks. They must minimize their risk of exposure by deploying the most sophisticated security and anti-malware software, using outside firms to frequently penetration-test their cyber defenses, continuously training their employees to comply with the most stringent security...
Keeping up with news alerts about cybersecurity flaws in consumer electronics is a lot like picking up spilled jelly beans one at a time with a plumber’s wrench. Even if you figure out how to do it and have endless patience, a few will skitter out of sight. Assume for the moment that, unlike most people, you think a lot...
Yesterday a cybersecurity firm reported that 360 million newly stolen credentials were available for sale on the deep web. The breach reportedly includes one attack that alone yielded 105 million records. Taken as a whole, that would make this aggregate compromise the largest breach of credentials to date, eclipsing the Adobe and Target breaches both in size and level...
Maybe the thought actually occurred to you that something was “phishy” about that link, but that’s so 30 seconds ago. You clicked and now your computer screen is locked. Behind that frozen screen lie your personal files — everything from photos to tax documents — all of it encrypted by a third party that promises to return access for...
With Valentine’s Day right around the corner, people are looking for love more and more online. Unfortunately, hackers and scammers are waiting to prey on online daters, hoping to steal their heart, along with their cash. Never Turn Over Personal Information or Pictures You Wouldn't Want Broadcast for the World to See. It’s not love if they ask for your credit...
malware
Social media is embedded in our lives—Facebook alone had 1.79 billion daily users as of September 2016—which means cyber criminals are not far behind. As companies increasingly rely on this digital channel for marketing, recruiting, customer service and other business functions, social media also has become a highly effective vehicle for cyber attacks. Outside of the corporate network perimeter and...
The announcement of a sixth subterranean nuclear test has the world talking about how to contain the threat of a nuke-ready North Korea, but there is another concern getting insufficient attention: the potential for full spectrum cyber war. Just what that might look like is known, but seldom discussed. Remember the NASDAQ flash crash? It happened on May 6, 2010, at...
Regular viewers of MTV’s series “Catfish” (in which online-only, deceptive relationships are pulled into the real world, albeit with cameras running) might think that the show just highlights the extreme cases of a common problem – people who tell lies in search of a personal connection. For instance, studies show that about 81% of people lie in their online...
When Sen. Patrick Leahy (D- VT) gavels the Senate Judiciary Committee to order on Tuesday, four witnesses will sit before the esteemed Senators to ostensibly discuss "Preventing Data Breaches and Combating Cybercrime." Among them will be the Senior Vice President and Chief Information Officer of the recently-hacked Neiman Marcus and the Executive Vice President and Chief Financial Officer of...
biometric scan
You can't change your physical traits very easily, so if a hacker steals your biometric data--look out. Scanning a fingerprint or even an eyeball to authenticate your identity is no longer the stuff of science fiction. Biometric identification has been in practical use for a while now, and the technology gets more sophisticated every day. It should come as no surprise that security and privacy concerns have...