Quantcast
Channel: cybercrime
Browsing all 12 articles
Browse latest View live

Security breach exposes iPad users

SAN FRANCISCO — AT&T Inc. yesterday acknowledged a security weak spot that exposed the e-mail addresses of apparently more than 100,000 users of Apple Inc.’s iPad, a breach that could make those...

View Article



Cybercrimes: It is a long road between right and resolution

By BECKY GILLETTE There are potential criminal and civil liabilities for hackers who compromise trade secrets, customer names and credit card information from a business. But finding the hackers,...

View Article

WESLEY McGREW — Being a “compliant” victim of cybercrime

When I discuss cybersecurity with business leaders, the most common misconception I see involves the role of security compliance. In my last column, I described the reality of cybercrime, a wild...

View Article

WESLEY McGREW: An Internet of hackable ‘things’ threatens your business

In this column, I try to avoid “buzz words” and jargon. Information security is complex enough without them. The security industry is overrun with companies that intend to confuse you with marketing...

View Article

WESLEY McGREW: Cyber security for the road warrior

In my previous columns, I’ve been describing the benefits of having offense-oriented testing performed on your company’s network. This time around, I want to give some advice for the road warriors...

View Article


FOCUS ON SECURITY: Ransomware can paralyze a business

By BECKY GILLETTE Ransomware can not only leave a business paralyzed with no access to its computer system, it can be extremely costly. The amount of ransom demanded has been on the rise over the past...

View Article

Security breach exposes iPad users

SAN FRANCISCO — AT&T Inc. yesterday acknowledged a security weak spot that exposed the e-mail addresses of apparently more than 100,000 users of Apple Inc.’s iPad, a breach that could make those...

View Article

Cybercrimes: It is a long road between right and resolution

By BECKY GILLETTE There are potential criminal and civil liabilities for hackers who compromise trade secrets, customer names and credit card information from a business. But finding the hackers,...

View Article


WESLEY McGREW — Being a “compliant” victim of cybercrime

When I discuss cybersecurity with business leaders, the most common misconception I see involves the role of security compliance. In my last column, I described the reality of cybercrime, a wild...

View Article


WESLEY McGREW: An Internet of hackable ‘things’ threatens your business

In this column, I try to avoid “buzz words” and jargon. Information security is complex enough without them. The security industry is overrun with companies that intend to confuse you with marketing...

View Article

WESLEY McGREW: Cyber security for the road warrior

In my previous columns, I’ve been describing the benefits of having offense-oriented testing performed on your company’s network. This time around, I want to give some advice for the road warriors...

View Article

FOCUS ON SECURITY: Ransomware can paralyze a business

By BECKY GILLETTE Ransomware can not only leave a business paralyzed with no access to its computer system, it can be extremely costly. The amount of ransom demanded has been on the rise over the past...

View Article
Browsing all 12 articles
Browse latest View live




Latest Images