There is a widening gap of talent in the cybersecurity industry due not only to growing cybercrime, but also to our ever increasing dependency on technology in terms of where and how we are social, purchase products, and ever more frequently entertain ourselves. Presently, there are not enough people to fill
Author: John Michael Sculley (John Michael Sculley)
Equifax Breach: 143 Million Americans Affected – Out Cry.
The FTC seems to be minimizing a data breach at the credit reporting agency Equifax that lasted 10 weeks from mid-May through July 29. Hackers accessed names, social security numbers, birth dates, addresses, and driver’s license numbers. They also obtained 209,000 credit card numbers.
Matter-of-fact reporting
2016 – Banner Year for HIPAA Breaches, PHI Caught In The Crossfire
25 million patient records were reportedly compromised in 2016 making it the banner year for electronic health record breaches. 88 breaches occurred in the last three months alone amounting to 458,639 patient records compromised from October through December.
And consumers are wary.
Social Media Sees 70% Rise In Cyber Crime in Six Months
Recently Twitter hired security company OurMine to hack their systems in order to find holes in its security. This isn’t surprising as studies show that cyber crime in social media grew 70% in the last sixth months. If you search “botnet,”” “hacking,” “DDoS,” or anything related to cybercrime on most social media, and you’ll find
$5 Million a Day In Online Advertising Fraud – Methbot
An elaborate cybercrime bot is responsible for stealing between $3 million and $5 million worth of revenue from online publishers and video advertising networks each day. The scam runs as a vast network of cloaked Internet addresses, in rented data centers, on bogus websites, with fake users all made to look like real people are watching short...
Lorrie Cranor, Chief Technologist of the FTC on How to Safeguard Your Smart Phone
Statistically, there’s a good chance you’re getting a new smartphone for Christmas. And now days, if you had to, you could run a small business right from your phone. However most people use their smartphones for day-to-day tasks like replying to email (i.e. Gmail, yahoo mail, etc.); checking social media (i.e. facebook, twitter, etc) and staying organized with Apps like online calendars, DropBox and Evernote. But it’s turning out that using your smartphone at all could lead to being taken advantage of by people that make a living from gaining access to your identity through your smartphone––information that is used to verify that you are in fact you.
Few people realize just how vulnerable cell phones are. A phone can be breached using as simple of a thing as a CCSS 7 (or common channel signaling system no.7) through your very phone number.
Target Marketing Good Vs Bad
Marketing and advertising is constantly evolving. Companies battle for position to grab our attention, not just to make a sale but to build familiarity with their brand. It works, even today as you are more likely to make a sale if someone has heard of your brand before. The next time you go into a...
Why Is Dooth Private Internet Free?
We all like free things but they are usually meant to get us in the door, get us to spend more money on something else or meant as a trial that only lasts for a few days or weeks. So when Dooth announced they are offering their private internet platform for free there were some questions that...
End To End Encryption
Everyone understands the world of the private internet at different levels. Some people can check their email with ease but struggle to understand Facebook. Others can handle most tasks with ease but struggle with understanding how things actually function. What’s a ram, what’s a GB, what’s end to end encryption? Don’t beat yourself up if...
What’s Even Creepier Than Target Guessing That You’re Pregnant?
The age of big data is frightening to a lot of people, in part because of the implicit promise that algorithms, sufficiently supplied with data, are better at inference than we are. Superhuman powers are scary: Beings that can change their shape are scary, beings that rise from the dead are scary, and beings that...
- 1
- 2