Zombie Botnet Reminds Us that Cyber Crime Isn't Going Away
TechCrunch reports that cyber criminals have brought a botnet back to life, and like all zombies, this reanimated botnet is stronger than before!Botnets are massive collections of computers that...
View ArticleHackety-Hack, Don't Click That (Even Savvy Bitcoin Bidders Are Getting Phished!)
The Wall Street Journal reports on a recent hack that shows spear phishing can hit anyone, even the most tech savvy Bitcoin companies. We'll look at how this attack stole tens of thousands from one...
View ArticleWhat the Apple-IBM Partnership Means for IT Professionals
ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...
View ArticleBlackphone and Blackberry Duke It Out, But the Fight May Be Futile
A recent ZDNet article gives a blow-by-blow account of the fight between Blackberry and Blackphone over which company offers better mobile security. In a series of back-and-forth blog posts, the...
View ArticleData Breach Research Shows Hackers Love Weak Java
Symantec's Internet Security Threat Report, a post-mortem analysis of the previous year's cyber attacks, comes to a startling conclusion: 97 percent of zero-day attacks were Java based.A zero-day...
View ArticleMobile Security Update: 1 in 10 Android Apps Is a Virus
HackSurfer reports on the sorry state of cyber security on the Android platform where 1 in 10 apps contains malware. Yikes.You read that correctly: 10 percent of Android apps are malware. Over the last...
View ArticleIT Professional's Firing Would Have Been a Lawsuit for an IT Contractor
The Arizona Republic reports that Miguel Corzo, a community college IT employee who had been working in the district for 30 years, has been fired after his actions led to a data breach that has already...
View ArticleCalifornia Data Breach Law Raises as Many Questions as It Answers
IT consultants are subject to a variety of state laws. Your legal responsibilities change from state to state, and each new court ruling – such as the one that just occurred in California – can...
View ArticleClass Action Suit against eBay over Data Breach Seeks $5 Million in Damages
As Computer World reports, a newly filed lawsuit against eBay shows how data breaches are becoming big business for lawyers.The breach, which was discovered in February, has led to a $5 million class...
View ArticleDDoS Is the New Black
CNET reports that distributed denial of service (DDoS) attacks have occurred at an unprecedented rate in the first half of 2014. This year has already had more than twice the amount that occurred in...
View ArticleWhen Deleting Malware Isn't Enough
Citadel, a particularly potent strain of banking malware, has been pestering IT security consultants for the last two years. ThreatPost reports that the latest strain has found a way to return to...
View ArticleMega-Breach Is an Excellent Client Education Opportunity
When Target's data breach hit the front pages, many small-business owners saw it as evidence that hackers only go after big business. But the latest – and largest– data breach, which stole 1.2 billion...
View ArticleBlack Hat Security Conference: Hackers Can Steal Your Car
Last week's Black Hack security conference brought exposure to countless security flaws in nascent Internet-of-Things technology. CBS News reports that security consultants have found ways to...
View ArticleWhat the Apple-IBM Partnership Means for IT Professionals
ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...
View ArticleBlack Hat Security Conference: Hackers Can Steal Your Car
Last week's Black Hack security conference brought exposure to countless security flaws in nascent Internet-of-Things technology. CBS News reports that security consultants have found ways to...
View ArticleOld Technology Is a Cyber Liability
In last week’s blog post, "Black Hat Security Conference: Hackers Can Steal Your Car,” we looked at how new technology – the Internet-of-Things and Internet-enabled cars – exposed consumers to greater...
View ArticleFacebook Color-Changer Malware Has Users Feeling Blue
TechHive reports that over 10,000 users have fallen victim to a Facebook-based malware attack. Like other schemes before it, the color-changer malware purports to allow users to customize their...
View ArticleStudy: Half of Businesses Will Hire IT Security Contractors by 2018
A study recently published by technology research firm Gartner shows that spending on IT security has increased 7.9 percent so far in 2014, to $71.1 billion. Based on trends, the firm predicts that...
View ArticleHacking Victims May Have a New Worry: FTC Penalties
This week on the blog, we've discussed the difficulties IT professionals have with data security laws: they don't know which data security laws (if any) they need to follow and they don't know how...
View ArticleDairy Queen's Data Leaked Like Ice Cream from a Cone on a Hot Day
As a last hurrah before summer fades, hackers got a taste for ice cream and decided to attack the summertime staple Dairy Queen. We're only partially kidding.In the winter, we saw hackers go after...
View Article