This year that annual shopping frenzy in the U.S. known as Black Friday will take place on November 27, the day after Thanksgiving. Sales, according to the Black Friday website, will actually start early on Thanksgiving Day and extend throughout the weekend. Total sales are expected to top $80 billion. Also, the number of bargain hunters will increase this year to well over 300 million. Sales channels will include both brick and mortar stores as well as online retailers.
As the holiday shopping season approaches, the American Bankers Association is educating consumers about the new chip technology embedded in many credit and debit cards. The new chip cards offers bank customers an added layer of security just in time for the holidays. The chip – a small metallic square on the front of the payment card – assigns a one-time code for each transaction, and makes it nearly impossible for fraudsters to create counterfeit cards.
Cybrary, the world’s first and only no-cost cyber security massive open online course (MOOC) provider, announced the availability of its Android-based mobile app that allows users with limited Web access – particularly in developing countries – to learn hacking, forensics and other cyber security skills on the go.
Chip and PIN cards are nothing new. For several years, retailers in Europe have accepted the cards, which transmit information about the transaction to the payment processor, including the card number and account details, via a secure token or one-time use code. These codes are practically useless to hackers, thereby protecting credit card users from having their financial data stolen. The cards themselves contain a chip, which when inserted into a special reader, makes the conversion; in order to complete the transaction, the customer must enter a PIN, instead of a signature.
Nikhil Premanandan, ManageEngineIn this interview, Nikhil Premanandan from ManageEngine discusses the importance of notifying DBAs the moment any anomalous activity is detected and finding the root cause, enabling a faster threat mitigation response. Read More >>>
Cybercrime is thriving … as demonstrated by several high-profile, online data breaches in the press recently. As static, on-premise security measures are increasingly becoming ineffective against attempts to steal data and take web services offline, many security professionals are left unsure how to best mitigate these evolving threats.
Data breaches have become so commonplace that we almost expect them. Credit cards are compromised when retail stores are hacked. Social Security numbers are at risk when government agencies or physician’s offices fall prey to phishing expeditions. And those are just the perils the average American faces with domestic hackers. It’s just as easy for people from far-flung countries – some of whom may be working on the behest of their governments – to infiltrate our computer systems and disrupt our way of life.
A new report by Allied Market Research titled, “World Hardware Encryption—Market Opportunities and Forecasts, 2014–2020” forecasts that the world hardware encryption market would garner revenue of $296.4 billion by 2020, registering a CAGR of 54.6% during the forecast period of 2015–2020. Hard disk drives are the most widely encrypted devices, accounting for the highest market share throughout analysis period. Asia-Pacific is the largest revenue generating region for hardware encryption, followed by North America and Europe.
CryptoWall 4.0 has been released that displays a redesigned ransom note, new filenames, and now encrypts a file’s name along with its data. We were alerted to this new variant by various members who have posted about being infected by what was being called the help_your_files ransomware. Once we were able to analyze a sample, though, it was quickly determined that this was in fact a new version of CryptoWall.
A cybersecurity breach can happen at any moment. That’s why it’s important for small and mid-sized businesses to take the time to assess and review their business continuity plan. For many, these plans will include disaster recovery solutions that prevent detrimental data loss if and/or when malware attacks their security. Small businesses are more attractive targets for cybercriminals because their data tends to be less secure.
National Cyber Security Awareness Month and Halloween are both in October. Coincidence? Maybe. But, executives do have a lot to fear when it comes to cyber security. While many executives and IT teams are working hard to keep the bad actors out, there are still A LOT of vulnerabilities out there dressed up as the good guys. Today many agencies are being fooled by cyber threats hiding in plain sight – disguised in Secure Sockets Layer (SSL) traffic.
In the last five years, Cloud hosts such as Amazon Web Services, Google, Microsoft, Box and Dropbox have become increasingly popular and cost effective for storing and sharing data. That said, data theft has never been greater with network and cloud security becoming more porous. As the need for information sharing increases, the network domain and cloud-based model become more inadequate.
Today’s IT Needs Heroes to Keep Sensitive Data Safe & Protected. Over 78% of data breaches occur from employee negligence or maliciousness according to a recent study.
As the new holiday cybercrime season rolls in, we wanted to take a look at the scams of yesteryear. These scams or variations of them will come back around, so it’s important for IT departments to give employees a refresher course on what to keep out for. It’s becoming more important as online shopping increases and much of that happens on work computers or the devices that employees use for office communication.
When it comes to both online and offline systems, many business owners know that it’s important to think seriously about the security of their company. However, a large number of business owners also often lack the funds or time needed in order to take the necessary steps to ensure that their systems are as secure as possible. The fact is, however, that security can be as costly or as inexpensive as you make it, and there are certainly a number of security related steps that you can implement into the running of your business without having to spend a lot of money. Here we have listed a number of cost-effective ways in which you can improve the security of your business both online and offline.
by Agathe Caffier, DMIThese days, there’s just no telling who’s accessing your data. It could be a social network, an ad retargeting campaign, or even a cyber criminal who’s bought your private information on the dark Web. Read More >>>
Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry speaks with IT Briefcase about the results of a recent Heavy Reading survey of communications service provider (CSP) and network equipment provider (NEP) registrants regarding the current use of both traditional hardware and virtualized network appliances. Read More >>>
Fewer than half of all payment cards and PoS terminals in the US are currently EMV-ready. Moreover, US merchants and card issuers have been slow to migrate to the new technology. In the wake of EMV’s worldwide implementation, a wave of technologies – including near-field communication (NFC), tokenization and cloud-based wallets – is having an accelerating impact on the industry.
The internet has made positive changes in people’s loves but security risks have been a major threat to personal and financial privacy. Restricting your exposure online is necessary for ensuring that unknown people do not access or steal your data.
The Christmas shopping rush is soon upon us and the only thing we can be certain of, is that online shopping of gifts will continue to increase. But also that many e-customers will be disappointed with their online shopping experiences. “Response time is money”, claims Sven Hammar, CEO of Apica, a company offering solutions for testing, monitoring, and optimizing the performance of cloud and mobile applications like e-commerce platforms.
by Rob Quiros, SohaAs the move to hybrid cloud infrastructure causes the Internet and corporate network to meld, enterprises need a new approach to ensure all of their applications and network resources remain secure. But that is easier said than done, since traditional network perimeters and VPNs simply don’t work in this new cloud-based environment. Read More >>>
Technology is very much a part of our everyday lives. From smart watches to desktop computers, technology, and specifically the Internet has connected us to information in a way that many never thought possible. However, despite the overwhelming positives of the Internet, it has seen the way in which criminals act change as well. Hackers dedicate endless amounts of time to steal payment and personal information from Internet users and if you don’t have the necessary security on your system you could well see your world turned upside down due to cyber fraud.
Attacks on business computers and data are more prevalent today than a few years ago. Hackers can use malicious software embedded in emails, websites and downloadable files to infect your computer, or to steal valuable financial information, business records, and research data. Therefore, protecting your companies network, computers, and mobile devices must be a top priority. Here are some things you can do to shield your business from hackers and malicious software.
In this webcast, authentication and fraud experts from Gartner and Verint Systems discuss passive authentication for the contact center.
It is one thing to create a fully-functional, attractively designed and easy-to-use website for your business. However, if you’ve done this, it’s important to note that the work does not stop there. Maintaining your website and ensuring that it is secure should be a top priority, more so if you run an online store where customers can enter their personal information and banking details. Even if your website is simple or ‘static’, it’s still crucial that it is properly updated and maintained and that the security is kept up to date in order to protect yourself and your visitors from hackers and malicious malware. Read on to learn more about the importance of developing and maintaining a secure business website.
Is the FTC now going to sue the Pentagon because they did not protect consumer information? Hackers infiltrated the Pentagon food court’s computer system, compromising the credit and debit card info of an unknown number of employees. Lt. Col. Tom Crosson, a Defense Department spokesman, said on Tuesday that employees were notified that hackers may have stolen bank account information from people who paid for concessions at the Pentagon with a credit or debit card.
Criminals are using fake domains and emails to pose as CEOs, and convince employees to send them money, in some cases millions of dollars. The FBI calls this scam business email compromise (BEC), or CEO fraud. In January 2015, the FBI warned that cyber thieves stole nearly $215 million from businesses in the previous 14 months through such scams, which start when crooks spoof or hijack the email accounts of business executives or employees.
Tales of cyberespionage pervade mainstream media with new breaches being reported almost weekly. While cyberwarfare is a reality, sometimes the biggest breaches are not the work of spy agencies, organized crime syndicates or even sophisticated hackers, but rather the act of a former employee or business competitor. Today’s IT departments need not be on the look out for James Bond – it’s James the disgruntled former product manager with an axe to grind that they should be concerned with.