Data Risk Analysis: The Yahoo Example
The cost of data breaches directly affects the cost-benefit analysis when companies are planning their budgets. Studies on the average and median costs of breaches can play a significant role in guiding this analysis. A study that reports these costs as being generally low, therefore, is likely to be cited as reason to deemphasize the… Read More
Cybersecurity Risks and Incentives
Business leaders across America continue, in largely increasing proportions, to cite cybersecurity as a leading concern to their organization. In fact, according to the 2016 Travelers Risk Index (an annual survey on the biggest worries for businesses and consumers), 54% of enterprise leaders share this view. This complements the mere 13% who feel their organization… Read More
Election Interference and What Could Come Next
If I had to guess, I’d say there must be some disgruntled sports fans in Russia right now. In what I can only assume is retaliation for the whole doping scandal that banned almost the entire Russian team from the Rio Olympics last month, cyber thieves have released information on athletes of other countries, including… Read More
Boldly Going Where Hackers Have Already Been
Captain’s Log. Stardate 94293.37 Travelling back to the early 21st century to examine the state of Earth’s technological interconnectivity and security has revealed some troubling insights into our forerunners. These problems have multiplied like tribbles over the last few years, and one in particular stands out. One Earth year ago, in what would be 2015,… Read More
How Not to Maintain Consumer Trust
Ok, so this was pretty big news over the weekend, this WhatsApp “betrayal” of its users’ previously assured privacy by changing its privacy policy to share certain information with Facebook. When Facebook purchased the company in 2014, both Mark Zuckerberg and WhatsApp CEO Jan Koum insisted on independence between the two platforms. That would no… Read More
Media Under Siege?
SPOILERS for Mr. Robot Season two of Mr. Robot has so far escalated the first season’s conflict into a looming cyber war between the US and China, in which the latter’s Minister of State Security, Whiterose, through the “Dark Army” at her disposal, intends to take advantage of the chaos unleashed by the ECorp hack… Read More
One Malware to Rule Them All
A newly discovered malware strain, dubbed Project Sauron after Tolkien’s villain in The Lord of the Rings, has been secretly infecting and spying on the world’s top computers for five years. It’s a fitting moniker, as the dark lord of Middle-Earth was always in his own right associated with espionage. From the beginning he was… Read More
DNC hack shows severe US vulnerability to cyber attacks
The big news this weekend was, of course, the hack of the Democratic National Committee emails. 20,000 emails exposed ordinarily wouldn’t even make the Top 5 list of data breaches for a given month, but this story has deservedly been catapulted to number one. Few breaches have had the political significance of the DNC’s dirty… Read More
Mr. Robot returns, as unsettlingly relevant as ever
Everyone’s favorite narratively unstable, obliquely framed, psychological hacker drama, Mr. Robot, returned to TV this week with its second season premiere. Buckle in, because if you weren’t already paranoid enough about cyber security, you’ll never trust another device or email again. As before, any articles written here on Mr. Robot won’t really contain too much… Read More
When Sharing Becomes TMI
Last week was apparently host to Social Media Day. I had assumed that every day was Social Media Day, but June 30 specifically marks the anniversary of the celebration initiated by Mashable seven years ago. Recognition of the transformative and communicative power of the tool that has helped define the 21st century so far is worthwhile,… Read More