Guest Post – Mobile App Security Threats and Secure Best Practices Part 2

A guest post by KC Karnes

Mobile App Security Exploit Examples: Painful Real-life Lessons

The climate around mobile app security is heating up.

Mobile app vulnerabilities are exploited every day, resulting in expensive data breaches and loss of public trust.

In this section, we will try to learn from the failures of other companies and highlight how real the threats outlined above can be.

Timehop Fails To Trust Two-Factor Authentication

Starting in December of 2017, TimeHop was ...

Continue Reading →
0

Guest Post – Mobile App Security Threats and Secure Best Practices Part 1

A guest post by KC Karnes

Is your mobile app secure?

It shouldn’t come as a surprise that mobile apps are targeted by hackers, given the rapid adoption and increased usage globally. By some estimates, one out of every 36 mobile devices has high-risk apps installed.1

An even more sobering mobile app security statistic for businesses to hear: 71% of fraud transactions came from mobile apps and mobile browsers in ...

Continue Reading →
0

Guest Post – The Ultimate Online Privacy Guide Part 3

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scoped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we publish the second ...

Continue Reading →
0

Guest Post – The Ultimate Online Privacy Guide Part 2

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scoped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we publish the second ...

Continue Reading →
0

Guest Post – The Ultimate Online Privacy Guide Part 1

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scooped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we open a three ...

Continue Reading →
0

Most Americans Unaware of Personal Data Loss

Data breaches.  It seems that every week some other company is featured in the news as the latest victim.  But who really is the victim?  The company that was breached, or the people whose personal information was stolen?  Have you been affected by a data breach?  How would you know?

A recent survey published on Lexington Law ask over a thousand people whether they knew if their ...

Continue Reading →
0

Prepare For The Worst

Answer this question:  What is the worst thing that could happen, that would put me out of business?  Often, I am working with small business owners who really have no idea where to start when it comes to developing a cybersecurity program.  A really easy way to start is to prepare for the worst.  If you have thought about what ...

Continue Reading →
0

New Attacks Against SCADA, ICS, and Industrial Safety Control Systems

This can’t be good.  Klaxons sounding at the chemical plant only meant one thing, that the automatic safety systems were not working and that a dangerous explosion was immanent.  The explosion would release a toxic cloud of hydrogen sulfide gas that would kill everyone at the plant and hundreds of people living nearby.

A movie scene?  A spy novel plot?  Unfortunately not, this is an actual event that took place in ...

Continue Reading →
0

Personal and Business Uses for Keyloggers.

Would you like to use a keylogger to spy on your spouse?  How about your kids?  Is it legal?  Can an employer use a keylogger to monitor employee computer activity in the workplace?

Usually, when I am discussing keyloggers, it is the kind of keylogger a cyber-criminal would use, and how to keep them off our computer.  Today we are looking at this from another angle.

A keylogger, if you don’t know, ...

Continue Reading →
0
Page 40 of 107 «...1020303839404142...»