Quantcast
Channel: Tech Insurance Small Business Center - Cyber SecurityTech Insurance Small Business Center0.0000000.000000
Browsing all 518 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Zombie Botnet Reminds Us that Cyber Crime Isn't Going Away

TechCrunch reports that cyber criminals have brought a botnet back to life, and like all zombies, this reanimated botnet is stronger than before!Botnets are massive collections of computers that...

View Article


Image may be NSFW.
Clik here to view.

Hackety-Hack, Don't Click That (Even Savvy Bitcoin Bidders Are Getting Phished!)

The Wall Street Journal reports on a recent hack that shows spear phishing can hit anyone, even the most tech savvy Bitcoin companies. We'll look at how this attack stole tens of thousands from one...

View Article


Image may be NSFW.
Clik here to view.

What the Apple-IBM Partnership Means for IT Professionals

ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...

View Article

Image may be NSFW.
Clik here to view.

Blackphone and Blackberry Duke It Out, But the Fight May Be Futile

A recent ZDNet article gives a blow-by-blow account of the fight between Blackberry and Blackphone over which company offers better mobile security. In a series of back-and-forth blog posts, the...

View Article

Image may be NSFW.
Clik here to view.

Data Breach Research Shows Hackers Love Weak Java

Symantec's Internet Security Threat Report, a post-mortem analysis of the previous year's cyber attacks, comes to a startling conclusion: 97 percent of zero-day attacks were Java based.A zero-day...

View Article


Image may be NSFW.
Clik here to view.

Mobile Security Update: 1 in 10 Android Apps Is a Virus

HackSurfer reports on the sorry state of cyber security on the Android platform where 1 in 10 apps contains malware. Yikes.You read that correctly: 10 percent of Android apps are malware. Over the last...

View Article

Image may be NSFW.
Clik here to view.

IT Professional's Firing Would Have Been a Lawsuit for an IT Contractor

The Arizona Republic reports that Miguel Corzo, a community college IT employee who had been working in the district for 30 years, has been fired after his actions led to a data breach that has already...

View Article

Image may be NSFW.
Clik here to view.

California Data Breach Law Raises as Many Questions as It Answers

IT consultants are subject to a variety of state laws. Your legal responsibilities change from state to state, and each new court ruling – such as the one that just occurred in California – can...

View Article


Image may be NSFW.
Clik here to view.

Class Action Suit against eBay over Data Breach Seeks $5 Million in Damages

As Computer World reports, a newly filed lawsuit against eBay shows how data breaches are becoming big business for lawyers.The breach, which was discovered in February, has led to a $5 million class...

View Article


Image may be NSFW.
Clik here to view.

DDoS Is the New Black

CNET reports that distributed denial of service (DDoS) attacks have occurred at an unprecedented rate in the first half of 2014. This year has already had more than twice the amount that occurred in...

View Article

Image may be NSFW.
Clik here to view.

When Deleting Malware Isn't Enough

Citadel, a particularly potent strain of banking malware, has been pestering IT security consultants for the last two years. ThreatPost reports that the latest strain has found a way to return to...

View Article

Image may be NSFW.
Clik here to view.

Mega-Breach Is an Excellent Client Education Opportunity

When Target's data breach hit the front pages, many small-business owners saw it as evidence that hackers only go after big business. But the latest – and largest– data breach, which stole 1.2 billion...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Security Conference: Hackers Can Steal Your Car

Last week's Black Hack security conference brought exposure to countless security flaws in nascent Internet-of-Things technology. CBS News reports that security consultants have found ways to...

View Article


Image may be NSFW.
Clik here to view.

What the Apple-IBM Partnership Means for IT Professionals

ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...

View Article

Image may be NSFW.
Clik here to view.

Black Hat Security Conference: Hackers Can Steal Your Car

Last week's Black Hack security conference brought exposure to countless security flaws in nascent Internet-of-Things technology. CBS News reports that security consultants have found ways to...

View Article


Image may be NSFW.
Clik here to view.

Old Technology Is a Cyber Liability

In last week’s blog post, "Black Hat Security Conference: Hackers Can Steal Your Car,” we looked at how new technology – the Internet-of-Things and Internet-enabled cars – exposed consumers to greater...

View Article

Image may be NSFW.
Clik here to view.

Facebook Color-Changer Malware Has Users Feeling Blue

TechHive reports that over 10,000 users have fallen victim to a Facebook-based malware attack. Like other schemes before it, the color-changer malware purports to allow users to customize their...

View Article


Image may be NSFW.
Clik here to view.

Study: Half of Businesses Will Hire IT Security Contractors by 2018

A study recently published by technology research firm Gartner shows that spending on IT security has increased 7.9 percent so far in 2014, to $71.1 billion. Based on trends, the firm predicts that...

View Article

Image may be NSFW.
Clik here to view.

Hacking Victims May Have a New Worry: FTC Penalties

This week on the blog, we've discussed the difficulties IT professionals have with data security laws: they don't know which data security laws (if any) they need to follow and they don't know how...

View Article

Image may be NSFW.
Clik here to view.

Dairy Queen's Data Leaked Like Ice Cream from a Cone on a Hot Day

As a last hurrah before summer fades, hackers got a taste for ice cream and decided to attack the summertime staple Dairy Queen. We're only partially kidding.In the winter, we saw hackers go after...

View Article
Browsing all 518 articles
Browse latest View live