Quantcast
Channel: Blog Feed 1
Browsing all 714 articles
Browse latest View live

Is Your VPN Leaking Your Info?

Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true online privacy has never seemed more...

View Article



Are You Helping an ID Thief Get a Credit Card?

You can spot a Nigerian email scam without opening it. You know what you’re doing when it comes to keeping ID thieves from conning you. And if someone tried to get the kind of personal information...

View Article

5 Ways Brokers Can Maximize Their Voluntary Employee Benefits Portfolios

By Denise SzottBrokers, now more than ever, need a proactive strategy to help employer clients meet a growing demand for enhanced employee benefits.To do so, brokers must be ready to leverage their...

View Article

So, you took one of those Facebook Personality Quizzes. Now What?

Who is Cambridge Analytica?Cambridge Analytica is a voter profiling consulting firm that used data mining and psychographic targeting for political campaigns, most notably for Donald Trump’s 2016...

View Article

Privileged Access Could Be a Company Killer

It doesn’t matter how many times you tell employees not to share passwords. A new study suggests many people are still going to do it.The 2018 Privileged Access Threat Report, recently published by...

View Article


Get Ready for More Data Scraping Stories

Don’t be surprised if the Cambridge Analytica/Facebook story turns out to be merely the first in a long line of stories to come about the abuse of consumer data purloined from social media.ZDnet...

View Article

Cybercrime Payout Equal to the GDP of Russia

Cybercriminals are earning more than ever before, with an annual haul of $1.5 trillion according to a new study conducted by Dr. Michael McGuire, a senior lecturer in criminology at the University of...

View Article

Moving in the Right Direction: New NIST Best Practices for Cyber

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has released its first major revision to their standards and best practices for cybersecurity policy this...

View Article


Does Anyone REALLY Know the Difference Between a Data Breach, Compromise,...

Do you? Currently and depending on who is speaking, there are varying and frequently opposing answers – even among experts – leaving consumers grasping for a better understanding of what it means for...

View Article


5 ways to address election system weaknesses for cities and counties

The front lines in defending the security and privacy of voting against enemies include the localities who manage the voting precinct on election day. The cities and counties need to be just as...

View Article

Two-Factor Authentication Can’t Stop This Phishing Attack

KnowB4’s chief hacking officer Kevin Mitnick released a video that should send shudders down the spine of anyone using 2-factor authentication.Implementing a standard attack mode, in this case a...

View Article

Can Larry Ellison Topple Jeff Bezos by Becoming a Cybersecurity Champion?

If you don't think cybersecurity is a selling point these days, you're probably not doing as well as you could be--no matter what it is you do in digital. Larry Ellison is dialed into this new home...

View Article

And Now for Something Entirely Different: Another Facebook Compromise

It would be easy to confuse recent news that data belonging to 3 million Facebook users was exposed online with the Cambridge Analytica debacle that involved 87 million users. Both stories have their...

View Article


Google Location Data Grabs in the Crosshairs

U.S. Senators Richard Blumenthal (D-CT) and Edward Markey (D-MA) have formally requested the FTC to begin an investigation into Google for tracking the location of Android users.The request follows...

View Article

California Ballot Initiative Proposes Consumer Privacy Reform

A ballot initiative was recently proposed in California to give consumers privacy rights similar to those granted by the EU’s General Data Protection Regulation. The initiative, called the California...

View Article


3 Hidden Traps in the GDPR and How to Avoid Them

The EU’s new data privacy regulation contains many pitfalls. We think you should be most aware of these three.Enforcement of the European Union’s General Data Protection Regulation just days...

View Article

What U.S. Businesses Need to Know About the GDPR

For privacy and cyber security advocates, the GDPR represents a watershed moment, but precisely how this new law will play out in the marketplace is anyone's guess. It's been crystal clear from the...

View Article


How Brokers Can Seize Cyber Opportunities

Cyber crime is an unwelcome reality for millions of people in the United Kingdom—one that is creating new opportunities for insurers and brokers, according to the Cyber Research 2018 survey conducted...

View Article

Worse than Cambridge Analytica: The Securus Hack

A data privacy scandal of far greater magnitude than Cambridge Analytica was reported this month, and while it gets worse with each new emerging detail, it’s getting nowhere near the same coverage.As...

View Article

Threat Level Rising: What You Need to Know About Ransomware

Simple tools. Ominous results. Ambitious cyber criminals launched devastating ransomware attacks in 2017, taking in billions of dollars and disrupting businesses around the world.As ransomware becomes...

View Article
Browsing all 714 articles
Browse latest View live




Latest Images