LinkedIn Lawsuit: Courts Catching Up with Tech
Insurance Journal reports that tech companies may be on the hook for more lawsuits as a federal judge ruled that LinkedIn can be sued for its email and data collection policies. A lawsuit against a...
View ArticleDo We Need a Miss Manners of Data Breaches?
At her peak, Judith Martin, aka Miss Manners, wrote a popular advice column that was featured in over 200 newspapers. She helped guide many hapless people through difficult social situations – and some...
View ArticleYo App Hacked
The BBC reports that one of the silliest and least useful apps of all time – a messaging service called Yo – has major security flaws. That's not really accurate. To say that Yo has "security flaws" is...
View ArticleTechnology vs. Laws: Rideshare Edition
The Pittsburgh Post-Gazette reports on the difficulty ridesharing companies such as Lyft and Uber have had as regulators struggle to decide which laws apply to this new service. Regardless of where you...
View ArticleDefense Against the Hacking Arts Requires CONSTANT VIGILANCE
According to ThreatPost, researchers have found a way to bypass PayPal's two-factor authentication an enhanced security feature recommended by many security experts. This proves – much like in the...
View ArticleData Security Turbulence: New Attacks Target Airport Security
The security and risk management site CSO Online reports that 75 U.S. airports have been affected by cyber attacks, and four airports received "advanced persistent attacks" – a sign that hackers are...
View ArticleHow Tech Illiteracy Could Cost You Thousands
During the recent Supreme Court hearing over Aereo, the Internet-streaming TV service, it became clear that the Supreme Court (and the legal system in general) knows very little about technology....
View ArticleTerrifying New Android Malware Is Basically a Brain Parasite for Smartphones
It's easy to overreact about new cyber threats, but as ThreatPost reports, a piece of fledgling Android malware is pretty much a brain virus that might create an army of infected zombie smartphones...
View ArticleHow Florida's New Data Breach Law Could Cost Tech Businesses
As the federal government hems and haws its way through new data breach legislation, states are springing into action to pass their own, tougher data breach laws – it’s just happened in Florida where...
View ArticleHotel Hippo Closure Would Be a Wakeup Call for Small Businesses (If Anyone...
SCMagazine reports that hotelhippo.com, a hotel reservation site, has shuttered after poor security led to a data breach.Though the company was small and only 24 customers were affected, the data...
View ArticleLessons from Small IT Businesses Challenging Giants
NPR reports on how a tech non-profit that relies on volunteers is taking aim at one of Google's strongest markets: maps.In addition to helping you search for Thai food locations, Google actually sells...
View ArticleDevelop Apps? Use Password Protection to Avoid Fines
CNET reports that the FTC has ruled Amazon must refund customers whose children made in-app purchases.The question of how to regulate in-app purchases generated a lot of discussion – and a few...
View ArticleSurvey: Business Owners Want Technology Professionals
IT contractors and consultants are used to ebbs and flows in their businesses. You've had busy months and long-term contracts, but you also know what it's like to have downtime. That's part of the...
View ArticleIs It Time to Start Preaching Data Breach Management, Not Prevention?
Infosecurity issues a statement guaranteed to shock many business owners: data breaches are inevitable. With breaches bound to happen, data security experts are beginning to offer a new take on IT risk...
View ArticleZombie Botnet Reminds Us that Cyber Crime Isn't Going Away
TechCrunch reports that cyber criminals have brought a botnet back to life, and like all zombies, this reanimated botnet is stronger than before!Botnets are massive collections of computers that...
View ArticleIdentity Theft Costs $24.7 Billion Per Year, More Than All Property Crime...
If your clients are wary of investing in cyber security, all you need to do is give them one number: $24.7 billion. That's the amount of damages caused by cyber criminals each year. It's more than all...
View ArticleHackety-Hack, Don't Click That (Even Savvy Bitcoin Bidders Are Getting Phished!)
The Wall Street Journal reports on a recent hack that shows spear phishing can hit anyone, even the most tech savvy Bitcoin companies. We'll look at how this attack stole tens of thousands from one...
View ArticleWhat the Apple-IBM Partnership Means for IT Professionals
ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...
View ArticleBlackphone and Blackberry Duke It Out, But the Fight May Be Futile
A recent ZDNet article gives a blow-by-blow account of the fight between Blackberry and Blackphone over which company offers better mobile security. In a series of back-and-forth blog posts, the...
View ArticleData Breach Research Shows Hackers Love Weak Java
Symantec's Internet Security Threat Report, a post-mortem analysis of the previous year's cyber attacks, comes to a startling conclusion: 97 percent of zero-day attacks were Java based.A zero-day...
View Article