4 Ways Organizations Should Respond to Data Breaches

Cyber criminals try to hack organizations for a variety of reasons – they may want personal medical records; associated information of value such as debit and credit cards numbers and Social Security numbers; and even research for intellectual property theft. A new report from KPMG, “The Day After,” examines a four-phase approach to remediation that organizations can use in the hectic hours after discovering a data breach or cyberattack. Those phases include react, respond, transform and sustain.

Continue Reading…

VerticalScope Hacked, Over 40 Million Users Exposed

VerticalScope, which hosts 1,100 websites and forums, was hacked earlier this year, with the details of around 45 million users later leaked online.

Some of the most popular online communities hosted by VerticalScope include Techsupportforum.com, MobileCampsites.com, Pbnation.com, and Motorcycle.com, all of which were impacted by data leak. Apparently, the data was stolen during a breach in February this year, according to paid search engine LeakedSource, which broke the news on the incident.

Continue Reading…

Anonymous Messaging: Is Kik Safe for Your Children?

While chat rooms and the risk of children being pursued by predators online may seem like a thing of the past, this threat is still alive and well. In fact, it’s only gotten harder to detect with the advancement of technology, thanks to things like popular social media sites and messaging apps. As The New York Times pointed out, one of those messaging apps in particular, called Kik, has been linked to online predators more than once, which should set off alarms for parents everywhere. Because safety has been called into question over Kik on numerous occasions, it’s important as a parent to know what exactly the app is, how it works and whether or not you should allow your children to use it.

Continue Reading…

Why You Shouldn’t Make Fun of Mark Zuckerberg’s Password

Mark Zuckerberg suffered a major breach of privacy on June 5 when hackers gained access to his personal social media accounts.  Many people criticized the Facebook CEO’s simple password — “dadada” — as well as the fact he reused the same password across multiple services.

While Zuckerberg’s choices may not follow experts’ recommended security practices, they reflect the norms of cybersecurity more than an extreme case of negligence. If anything, the revelation should prompt the general public and businesses to take a look in the mirror and evaluate their own cybersecurity hygiene.

Suffice it to say, Mark Zuckerberg isn’t alone in his poor password choices.

Continue Reading…

Hackers Could Have Changed Facebook Messenger Chat Logs

Here’s a Facebook hack straight from the pages of the novel 1984: A way to rewrite the record of the past.

“Who controls the past controls the future: who controls the present controls the past,” went the ruling party’s slogan in George Orwell’s dystopian novel.

Security researchers have found a way to control the past, by altering Facebook’s logs of online chats conducted through its website and Messenger App.

Continue Reading…

Page 49 of 72« First...102030...4748495051...6070...Last »