Your Personally Identifiable Information Is Part of You: Stop Giving It Away

Are hackers really the problem when governments can just ask for or legislate the requirement to turn over user data? Russia currently has approximately 149 million people living in within its borders, and while Tinder is not the most popular dating ap… Continue reading Your Personally Identifiable Information Is Part of You: Stop Giving It Away

Think Your Business Is Too Small to Get Hacked? Wake Up!

Sixty percent of small- to mid-sized businesses (SMBs) go bankrupt six months after suffering a cyberattack. The risk is simply too great. SMBs need to strengthen their digital security. Uber…Equifax…Yahoo…if you look only at the head… Continue reading Think Your Business Is Too Small to Get Hacked? Wake Up!

Smart Ski Helmet Headphone Flaws Leak Personal, GPS Data

A rash of security flaws in the Outdoor Tech CHIPS smart headphones, which fit in ski helmets, allow bad actors to collect data like emails, passwords, GPS location – and even listen to conversations in real time. Continue reading Smart Ski Helmet Headphone Flaws Leak Personal, GPS Data

Smart Ski Helmet Headphone Flaws Leak Personal, GPS Data

A rash of security flaws in the Outdoor Tech CHIPS smart headphones, which fit in ski helmets, allow bad actors to collect data like emails, passwords, GPS location – and even listen to conversations in real time. Continue reading Smart Ski Helmet Headphone Flaws Leak Personal, GPS Data

It’s Beginning to Look a Lot Like Christmas, with Cyberattacks Lurking in Every Data Store

Based on the holiday song, “It’s Beginning to Look a Lot Like Christmas,” by Meredith Willson It’s beginning to look a lot like Christmas Everywhere you go Take a look at emails five and 10, it’s phishing time once again … Continue reading It’s Beginning to Look a Lot Like Christmas, with Cyberattacks Lurking in Every Data Store

Dark Patterns: Stealth Ways Companies Collect Personal Data

Security experts and security writers talk a lot about how sophisticated cybercriminals are at getting the information they want. But what we don’t talk enough about is how well legitimate companies are at tricking consumers into revealing our persona… Continue reading Dark Patterns: Stealth Ways Companies Collect Personal Data

Data Security Spotlight: Protecting Electoral (and Everyday) Data

Intelligence is key to data security in an age where data breaches have gone mainstream Did you vote on Tuesday? Or, were you part of the ​​“nearly one in five Americans” who wouldn’t or were “highly unlikely” to vote in mid-term elections because of … Continue reading Data Security Spotlight: Protecting Electoral (and Everyday) Data

35 Million U.S. Voter Records for Sale on the Dark Web

Security researchers from Anomali and Intel 471 made a troublesome discovery regarding personally identifiable information belonging to US residents. The researchers came across Dark Web communications that offered “a large quantity of voter data… Continue reading 35 Million U.S. Voter Records for Sale on the Dark Web

Overcoming the Shadow IT Catch-22

Trying to prevent shadow IT from sweeping through your organization is like trying to protect your sand castle from the waves when high tide rolls in—it can’t be done. Employees expect to be able to work wherever and whenever, and shadow IT tech… Continue reading Overcoming the Shadow IT Catch-22