![]()
Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.
|
pwSafe Cracks the Safe-Password Problem March 26, 2013
Hardly a day goes by without a data breach making the news or a social media account being hacked. That kind of news can be unsettling to many of us and leave us wondering how we can better protect our online security. One way to address the problem is to beef up your first line of defense against hackers: the passwords to your online accounts.
|
Hackers: The Flies in Social Media Marketing Ointment February 25, 2013
Did you hear? McDonald's has just acquired Burger King! Also, someone at the company apparently has a potty mouth. Another unusual and unexpected corporate trade also happened last week -- Cadillac acquired Jeep. These events, of course, didn't really happen. In both instances, hackers gained control of the brands' Twitter accounts and began sending out false and sometimes very offensive tweets.
|
|
BofA Service Outage Opens Window for Small Banks February 05, 2013
Bank of America's online banking operations crashed last Friday, cutting customers off from their accounts and reportedly disrupting the customer phone service to boot. It was the 1st day of the month -- a day when customers typically access their accounts to make sure paychecks have been deposited and to pay bills. Customers took to social media to gripe.
|
Feds Push Single Sign-on for Government Agencies January 30, 2013
The USPS is hosting a pilot project with the goal of simplifying the account ID process for all federal agencies. One possible solution: allowing citizens to use their existing e-commerce accounts to access agency websites. While electronic mechanisms enable federal agencies to provide some online government services, the process is burdensome for citizens and agencies, USPS said.
|
|
Brace Yourself for the Post-PC Threat Era January 28, 2013
It was inevitable. As computing has evolved, so has its nemesis: malware. "2012 is truly the year we entered the post-PC era as cybercriminals moved to embrace Android, social media platforms, and even Macs with their attacks," Trend Micro declared in its annual Security Roundup last week. A characteristic of the post-PC threat landscape is the accelerated growth of malware.
|
FBI Takes 10 Alleged Botnet Operators Offline December 13, 2012
The Federal Bureau of Investigation has arrested 10 individuals from around the world, including the United States, which it alleges are part of an international cybercrime ring linked to the Yahos malware. Yahos is associated with the notorious Butterfly botnet, which compromised more than 11 million computer systems and resulted in an estimated $850 million in losses.
|
|
Hacking by the Books: Barnes & Noble PIN Pads Bugged October 27, 2012
Barnes & Noble revealed this week that PIN pad devices at 63 of its stores nationwide were hacked, putting some of its customers at risk. The company discovered the hacking in September, and for the past month, the FBI has been investigating the case. Fewer than 1 percent of Barnes & Noble PIN pads reportedly were affected, but those who were could have had important data stolen.
|
Doing the Two-Step With Google October 18, 2012
Horror stories abound of electronic lives compromised by stolen passwords. One of the problems with a password-secured life is that the password is the single element that -- when compromised -- allows access. The User ID isn't protected, nor is any hardware. Shouldn't there be better methods?
|
|
Federal Grants Wed Public-Private Cybersecurity Efforts October 02, 2012
The debate in the U.S. Congress over a comprehensive national cybersecurity program is wearing on, largely because of differences over the roles of government and business in protecting information technology. Elsewhere, however, cybersecurity awareness and research projects are being launched through cooperative efforts.
|
Theft of Apple UDIDs Mitigated by News the FBI Didn't Have Them September 11, 2012
The case of the stolen database of Apple device identifiers is getting more intriguing by the day, with an entirely new player -- an app development company called "BlueToad" -- joining the cast of characters. BlueToad execs told reporters that the Apple UDIDs were stolen from it in a cyberattack launched two weeks ago.
|
|
Anonymous Dumps Trove of 1 Million Stolen Apple IDs September 04, 2012
The hacktivist group Anonymous has published 1 million universally unique identifiers belonging to Apple devices. These were among more than 12 million UDIDs stolen from the laptop of FBI Special Agent Christopher K. Stangl, the group said. Anonymous deleted personal data before releasing the data on the Internet.
|
Amazon, Apple Cork Security Holes August 08, 2012
Amazon and Apple changed some of their security policies this week after tech journalist Mat Honan claimed an identity theft incident involving the two companies allowed a hacker to wipe out much of his personal online data. Both Amazon and Apple put an end to policies that allowed customers to change their account settings over the phone.
|
|
'Hack' Attack on Journo Was Just a Simple Engineering Feat August 06, 2012
In the movies, hackers often type away at a keyboard and somehow -- movie magic, perhaps -- manage to crack a network's security and access encrypted files and protected data. In real life, bypassing security measures can be as simple as sweet-talking tech support. That is how tech journalist Mat Honan, a former Gizmodo writer, came under attack.
|
Siemens Patch Aims to Thwart Stuxnet Offspring July 30, 2012
Siemens, which made the industrial controllers targeted by the Stuxnet cyberweapon, announced last week that it was releasing some patches aimed at foiling attacks on its hardware similar to those mounted by the now-famous worm. Previous versions of the controllers used in SCADA systems allowed DLL files to be loaded into the devices without validation.
|
|
Apple's AuthenTec Deal May Truly Trouble Competition July 30, 2012
Apple wants to purchase security product maker AuthenTec for about $360 million. AuthenTec's users include Apple arch-rival Samsung, HP, and Portugal Telecom. "This [technology] will first go into tablets and laptops to conform with business offerings, and, second, become a weapon in [Apple's] ongoing battles with a variety of companies, but mostly Samsung," said tech analyst Rob Enderle.
|
Our Terrible, Horrible, No Good, Very Bad Password System July 18, 2012
It has been a heck of a year for password/password hash disclosures. In the same week in June, millions of password hashes were disclosed from LinkedIn, eHarmony and Last.fm. And in the same week in July, more than 450,000 usernames and unencrypted passwords were reportedly stolen from Yahoo Voice, while 420,000 password hashes were leaked as a result of an attack on Formspring.
|
|
LinkedIn Breach Blamed on Rusty Security June 07, 2012
LinkedIn has reported that some of its users' passwords have been stolen and published on the Internet. The company is withholding details, including exactly how many passwords were compromised. Members with accounts associated with the compromised passwords will find that their LinkedIn account password is no longer valid and will have to be reset.
|
12 Steps for Staying 1 Step Ahead of Online Security Threats March 23, 2012
With the explosion of Web-based communications in the form of applications, blogs, podcasts, and social networking sites like Facebook and Twitter, new security threats that can cause serious damage to computers are emerging. As they access these Web-based services from both work and personal computers, many users are unaware that they may be exposing themselves and their organizations to risk.
|
|
US Offers $10M to Jump-Start ID Security Tech Research February 07, 2012
Identity theft and privacy breaches are reported almost daily. For example, last month two utilities in New York reported that an employee of a software contractor allowed unauthorized access to a database containing social security, date of birth and other information. That same day the DoJ reported the arrest of three women in California for engaging in a scheme to use stolen identities to illegally collect tax refunds.
|
gTLD Security Threat Less Than Meets the Eye January 16, 2012
Despite the pleas of some regulators and the advertising industry, the overlords of the Internet -- the Internet Corporation for Assigned Names and Numbers -- plunged forward last week with its plan to drastically expand the number of generic top level domains on the Net.
|
See More Articles in Consumer Security Section >>

Headline Feeds





















