Verizon Vendor Vulnerability

After all the hassle Verizon must have experienced over the course of their purchase of Yahoo—considering the massive breaches the latter confronted—this was surely not something the company wanted to add to its next newsletter.  Unfortunately, the telecommunications giant has just confirmed a data breach of its own.  Not quite on the scale of Yahoo’s… Read More

Are You Prepared for GDPR?

The EU’s General Data Protection Regulation (GDPR) is a topic of growing relevance, not just to its own organizations, but worldwide. Any company that does business in Europe will be affected by the new standards. And yet, preparation for next year’s compliance deadline appears to be an exercise in procrastination. Research from two UK firms—GDPR… Read More

The Facebook Generation

The “Facebook generation,” Australian attorney-general George Brandis calls them, referring presumably to Millennials and those even younger.  According to him, this generation is comprised of those who don’t care all that much about privacy, as previous generations have.  “In the Facebook generation when people put more and more of their own personal data out there,… Read More

Internet of Risks

The Internet of Things giveth, and the Internet of Things taketh away.  Not that this is unexpected.  For every new device that gets hooked up to that great, all-reaching cyber squid, for every thermostat or refrigerator or porcelain throne that you might fear will one day go full on HAL 9000, there is a new… Read More

WannaCry? Tears of frustration, maybe

When you think about “the big one” in cybersecurity, you might call to mind the Target breach of 2013, the Anthem breach of 2014, and so on.  Although this year isn’t yet halfway through, the worldwide WannaCry malware attack that began last week might be significant enough to merit that position, when we think back… Read More

Third-Party Vulnerabilities and Careless Risks

There are still some surprising cyber stories out there, just as there are data breaches due to weirdly baffling oversight.  Imagine, a company being so careless as to give potential customers a look inside the secure network of an existing client, during its very public product demonstrations.  That is apparently what happened with cybersecurity startup,… Read More

Still Leaving Your Data Unencrypted?

“There’s no reason why mobile devices aren’t being encrypted all the time,” says Famida Rashid at InfoWorld, in her analysis of Verizon’s annual Data Breach Investigations Report.  In addition to the perpetual lack on this front, the report’s main findings reveal the predominance of malware, especially ransomware (which was the 22nd most common malware type… Read More

Security Shortcomings

The use of anonymous virtual private networks (VPNs) doubled between 2015 and 2016, according to a report by Dtex Systems.  Considering how the FCC just recently sold out your privacy rights to Internet Service Providers, and the resulting flood of VPN articles that ensued soon after, I wouldn’t be surprised if that number jumped even… Read More

Responsibility for Your Personal Health Data

Should a healthcare provider or hospital be blamed in the event of a successful data breach?  According to the American Hospital Association, the answer is no.  “Merely because an organization was the victim of a cyber attack does not mean that the organization itself was in any way fault or unprepared,” the organization said in… Read More

How safe are you from your ISP?

For you Apple users, now might be a good time to change the login credentials to your iPhone or iCloud accounts.  Whether it ultimately proves true or not, the evidence so far leans towards the conclusion that the hacking collective known as the Turkish Crime Family was able to collect a number of Apple accounts… Read More