Quantcast
Browsing all 375 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Some Small IT Biz Inspiration to Remind You Why You Do This

ZDNet's blog analyzes the tech media's response to the alleged hack of Dropbox and finds that many security recommendations offered by bloggers fall short. As it turns out, Dropbox was never hacked....

View Article


Image may be NSFW.
Clik here to view.

Phishing by the Dock of eBay

CIO Today reports eBay was hacked…again. Over the summer, nearly 145 million passwords were exposed, but this time hackers used a different approach to harvest data.Because eBay allows JavaScript and...

View Article


Image may be NSFW.
Clik here to view.

Beyond Passwords and PINs

From an IT perspective, a password or PIN is not a hallmark of security – it's a necessary evil. Ideally, there'd be a more secure way of encrypting and transferring data, but as it is, we're stuck...

View Article

Image may be NSFW.
Clik here to view.

The Least Fun Way to Spend that Extra $9,000

As an IT professional, you've undoubtedly worked with clients who won't commit an adequate amount of resources to data security. Many small-business owners simply don't think it's worth the extra money...

View Article

Image may be NSFW.
Clik here to view.

Secure Message Scorecard: How Do Your Favorite Apps Measure Up?

The Electronic Frontier Foundation is reviewing messaging apps and scoring them for security. You can see the results on a new Secure Messaging Scorecard posted on the group's website.The first...

View Article


Image may be NSFW.
Clik here to view.

Why the 31% of Businesses without Cyber Insurance Should Scare You

Insurance Journal reports on a study that shows 60 percent of businesses think cyber risks are very high for them, but 31 percent still have no Cyber Liability Insurance whatsoever.You might be...

View Article

Image may be NSFW.
Clik here to view.

iOS Malware Accesses Devices through Third-Party App Stores

Apple earned its sterling reputation for device security in part because iOS hadn't been hacked by malware. However, the company's reputation recently took a hit when a new strain of malware called...

View Article

Image may be NSFW.
Clik here to view.

Some Small IT Biz Inspiration to Remind You Why You Do This

ZDNet's blog analyzes the tech media's response to the alleged hack of Dropbox and finds that many security recommendations offered by bloggers fall short. As it turns out, Dropbox was never hacked....

View Article


Image may be NSFW.
Clik here to view.

Phishing by the Dock of eBay

CIO Today reports eBay was hacked…again. Over the summer, nearly 145 million passwords were exposed, but this time hackers used a different approach to harvest data.Because eBay allows JavaScript and...

View Article


Image may be NSFW.
Clik here to view.

Beyond Passwords and PINs

From an IT perspective, a password or PIN is not a hallmark of security – it's a necessary evil. Ideally, there'd be a more secure way of encrypting and transferring data, but as it is, we're stuck...

View Article

Image may be NSFW.
Clik here to view.

The Least Fun Way to Spend that Extra $9,000

As an IT professional, you've undoubtedly worked with clients who won't commit an adequate amount of resources to data security. Many small-business owners simply don't think it's worth the extra money...

View Article

Image may be NSFW.
Clik here to view.

Secure Message Scorecard: How Do Your Favorite Apps Measure Up?

The Electronic Frontier Foundation is reviewing messaging apps and scoring them for security. You can see the results on a new Secure Messaging Scorecard posted on the group's website.The first...

View Article

Image may be NSFW.
Clik here to view.

Why the 31% of Businesses without Cyber Insurance Should Scare You

Insurance Journal reports on a study that shows 60 percent of businesses think cyber risks are very high for them, but 31 percent still have no Cyber Liability Insurance whatsoever.You might be...

View Article


Image may be NSFW.
Clik here to view.

iOS Malware Accesses Devices through Third-Party App Stores

Apple earned its sterling reputation for device security in part because iOS hadn't been hacked by malware. However, the company's reputation recently took a hit when a new strain of malware called...

View Article

Image may be NSFW.
Clik here to view.

Snapchat's Snapcash Promises Secure Payments

Mobile payments have quickly become one of the hottest markets in tech. In the last month, we've seen Apple and a consortium of retailers vie for this growing market, and there are rumors that Facebook...

View Article


Image may be NSFW.
Clik here to view.

Cyber Risks on the Road Bad News for IT Consultants

As more devices are Internet-enabled, cyber liability can follow an IT consultant everywhere. Even on the road. But many businesses don't think to have a policy that addresses the IT risks traveling...

View Article

Image may be NSFW.
Clik here to view.

http://www.techinsurance.com/blog/cyber-risk/give-the-gift-of-spam-awareness-...

Krebs on Security reports that since November hackers have been using a new spam technique – phishing emails disguised as order confirmations from Target, Costco, Wal-Mart, and other big retailers – to...

View Article


Image may be NSFW.
Clik here to view.

Give the Gift of Spam Awareness This Holiday Season

Krebs on Security reports that since November hackers have been using a new spam technique – phishing emails disguised as order confirmations from Target, Costco, Wal-Mart, and other big retailers – to...

View Article

Image may be NSFW.
Clik here to view.

http://www.techinsurance.com/blog/cyber-risk/more-mobile-more-holes-more-it-s...

As part of our look ahead at 2015, let's examine how cyber security is expected to shift in the coming year. To begin, we'll look at mobile devices and new research that shows trends in device security...

View Article

Image may be NSFW.
Clik here to view.

2015: More Mobile, More Holes – But Will There Be More IT Sales?

As part of our look ahead at 2015, let's examine how cyber security is expected to shift in the coming year. To begin, we'll look at mobile devices and new research that shows trends in device security...

View Article
Browsing all 375 articles
Browse latest View live