Quantcast
Channel: Tech Insurance Small Business Center - Tech InsuranceTech Insurance Small Business Center0.0000000.000000
Browsing all 521 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

LinkedIn Lawsuit: Courts Catching Up with Tech

Insurance Journal reports that tech companies may be on the hook for more lawsuits as a federal judge ruled that LinkedIn can be sued for its email and data collection policies. A lawsuit against a...

View Article


Image may be NSFW.
Clik here to view.

Do We Need a Miss Manners of Data Breaches?

At her peak, Judith Martin, aka Miss Manners, wrote a popular advice column that was featured in over 200 newspapers. She helped guide many hapless people through difficult social situations – and some...

View Article


Image may be NSFW.
Clik here to view.

Yo App Hacked

The BBC reports that one of the silliest and least useful apps of all time – a messaging service called Yo – has major security flaws. That's not really accurate. To say that Yo has "security flaws" is...

View Article

Image may be NSFW.
Clik here to view.

Technology vs. Laws: Rideshare Edition

The Pittsburgh Post-Gazette reports on the difficulty ridesharing companies such as Lyft and Uber have had as regulators struggle to decide which laws apply to this new service. Regardless of where you...

View Article

Image may be NSFW.
Clik here to view.

Defense Against the Hacking Arts Requires CONSTANT VIGILANCE

According to ThreatPost, researchers have found a way to bypass PayPal's two-factor authentication an enhanced security feature recommended by many security experts. This proves – much like in the...

View Article


Image may be NSFW.
Clik here to view.

Data Security Turbulence: New Attacks Target Airport Security

The security and risk management site CSO Online reports that 75 U.S. airports have been affected by cyber attacks, and four airports received "advanced persistent attacks" – a sign that hackers are...

View Article

Image may be NSFW.
Clik here to view.

How Tech Illiteracy Could Cost You Thousands

During the recent Supreme Court hearing over Aereo, the Internet-streaming TV service, it became clear that the Supreme Court (and the legal system in general) knows very little about technology....

View Article

Image may be NSFW.
Clik here to view.

Terrifying New Android Malware Is Basically a Brain Parasite for Smartphones

It's easy to overreact about new cyber threats, but as ThreatPost reports, a piece of fledgling Android malware is pretty much a brain virus that might create an army of infected zombie smartphones...

View Article


Image may be NSFW.
Clik here to view.

How Florida's New Data Breach Law Could Cost Tech Businesses

As the federal government hems and haws its way through new data breach legislation, states are springing into action to pass their own, tougher data breach laws – it’s just happened in Florida where...

View Article


Image may be NSFW.
Clik here to view.

Hotel Hippo Closure Would Be a Wakeup Call for Small Businesses (If Anyone...

SCMagazine reports that hotelhippo.com, a hotel reservation site, has shuttered after poor security led to a data breach.Though the company was small and only 24 customers were affected, the data...

View Article

Image may be NSFW.
Clik here to view.

Lessons from Small IT Businesses Challenging Giants

NPR reports on how a tech non-profit that relies on volunteers is taking aim at one of Google's strongest markets: maps.In addition to helping you search for Thai food locations, Google actually sells...

View Article

Image may be NSFW.
Clik here to view.

Develop Apps? Use Password Protection to Avoid Fines

CNET reports that the FTC has ruled Amazon must refund customers whose children made in-app purchases.The question of how to regulate in-app purchases generated a lot of discussion – and a few...

View Article

Image may be NSFW.
Clik here to view.

Survey: Business Owners Want Technology Professionals

IT contractors and consultants are used to ebbs and flows in their businesses. You've had busy months and long-term contracts, but you also know what it's like to have downtime. That's part of the...

View Article


Image may be NSFW.
Clik here to view.

Is It Time to Start Preaching Data Breach Management, Not Prevention?

Infosecurity issues a statement guaranteed to shock many business owners: data breaches are inevitable. With breaches bound to happen, data security experts are beginning to offer a new take on IT risk...

View Article

Image may be NSFW.
Clik here to view.

Zombie Botnet Reminds Us that Cyber Crime Isn't Going Away

TechCrunch reports that cyber criminals have brought a botnet back to life, and like all zombies, this reanimated botnet is stronger than before!Botnets are massive collections of computers that...

View Article


Image may be NSFW.
Clik here to view.

Identity Theft Costs $24.7 Billion Per Year, More Than All Property Crime...

If your clients are wary of investing in cyber security, all you need to do is give them one number: $24.7 billion. That's the amount of damages caused by cyber criminals each year. It's more than all...

View Article

Image may be NSFW.
Clik here to view.

Hackety-Hack, Don't Click That (Even Savvy Bitcoin Bidders Are Getting Phished!)

The Wall Street Journal reports on a recent hack that shows spear phishing can hit anyone, even the most tech savvy Bitcoin companies. We'll look at how this attack stole tens of thousands from one...

View Article


Image may be NSFW.
Clik here to view.

What the Apple-IBM Partnership Means for IT Professionals

ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...

View Article

Image may be NSFW.
Clik here to view.

Blackphone and Blackberry Duke It Out, But the Fight May Be Futile

A recent ZDNet article gives a blow-by-blow account of the fight between Blackberry and Blackphone over which company offers better mobile security. In a series of back-and-forth blog posts, the...

View Article

Image may be NSFW.
Clik here to view.

Data Breach Research Shows Hackers Love Weak Java

Symantec's Internet Security Threat Report, a post-mortem analysis of the previous year's cyber attacks, comes to a startling conclusion: 97 percent of zero-day attacks were Java based.A zero-day...

View Article
Browsing all 521 articles
Browse latest View live