Verizon just released its highly anticipated 2014 Data Breach Investigation Report (which reports on security incidents for 2013) and it contains some bad news: the bad guys are getting better and better at hacking into our computers and network servers.
Tagged: data protection
The United States has successfully resisted chip and pin technology for nearly a decade, and we’ve got the data breaches to prove it. Find out why transitioning away from cards with magnetic strips could be a lengthy process, even though better credit card security is long overdue.
The Department of Justice recently released a report on identity theft victims for 2012 entitled Victims of Identity Theft. In just one year, 7% of the population — that’s more than 16 million U.S. residents age 16 or older — were victims of identity theft. Losses from identity theft came to an astounding $24.7 billion.
Consumers love their tablets. Their big touch screens and extreme portability make them ideal for browsing, apps, email, and a host of other online activities. So it’s not surprising that over half of users say tablets are their favorite device, according to Adobe data.
Unfortunately, tablets are also the favorite device of identity thieves, who love to hack them.
On April 7, all of the daily email blasts we received had the same word in the subject line. That word was Heartbleed. Keep reading to learn how to take measures to protect yourself and your information because Heartbleed (whether everyone knows it or not) is a serious bug, but there are security steps you can take today. After all, a bug in your computer is not unlike a bug in your body, and an ounce of prevention is worth a pound of cure.
CSID, a company that offers identity protection for businesses, released a white paper entitled “When Good Technology Goes Bad: Evolution of Mobile Technology,” which describes how our culture has been completely transformed by mobile technology and public WiFi networks. So what can you do to stay safe? Check out the advice and tips from CSID.
IT firm Sophos wanted to find out whether people were connecting to wireless networks securely and identified 72,000 wireless networks around San Francisco in a matter of days. How did these networks fare when it comes to WiFi security? Who is using the best security? And HOW many connected to Sophos’s fake public WiFi network?
Do you think it’s legal to collect data transmitted over unencrypted WiFi networks? Google does. That’s why it has gone to the highest court in the land to get a final decision on one of the most hotly debated legal issues of our time. The stakes couldn’t be higher for Google and for WiFi users everywhere.
Let’s start with the good news: you are still safe. The latest Heartbleed situation — which is a software bug, not a virus — has not endangered the privacy and security of our customers’ communications.
But one of our industry’s most respected security analysts claims “catastrophic” is the right word for Heartbleed, because “on the scale of 1 to 10, this is an 11.”
How likely are you to lose your job? What are the odds that you will take that medication your doctor prescribed to you? Are you the kind of person who will take your business to a competitor?
These are not just abstract questions. They are actual secret “consumer scores” that big data compiles on you and every adult in the U.S. to help companies and the government predict your behavior.
Should we allow public WiFi networks to be used for surveillance purposes? Should law enforcement be allowed to store mobile-device data on all citizens (not just those involved in an investigation)? If you agree that we all have an inherent right to privacy, check out this article about what the Seattle police are doing now.
Bad habits? Risky behaviors? What you don’t know about cloud computing could hurt your company. Check out the findings from a new study that suggests that employees who use these applications are exposing their organizations to security breaches and data losses at a much higher rate than non-cloud users.