As part of his series of State of the Union Address previews, President Barack Obama recently spoke at the National Cybersecurity and Communications Integration Center. He announced his intention to introduce new legislation to prosecute more easily cybercriminals and promote the flow of information regarding cyberthreats between the government and the private sector.
The impact of inexpensive IT networking systems has made cyberwarfare capabilities relatively cheap initiatives compared to pursuing nuclear weapons. For instance, North Korean hackers are chosen from universities and begin training at the age of 17. Pay is remarkably good, elevating the hackers and their families to high social status. The question remains: who wins, […]
While the world was in an uproar about the alleged North Korea hack on Sony Pictures, many other organizations were compromised as a result of loopholes and deficiencies in their web security. Many of these attacks did not receive as much publicity as the North Korea and Sony Pictures fiasco did. Here is a brief […]
As consumers increasingly utilize the Internet in many aspects of their daily lives, the challenge becomes enjoying the conveniences of online activities without sacrificing privacy. The mechanisms for protecting privacy continue to evolve as the focus of online activity transitions from laptops and desktop computers to smartphones and other portable devices. With enhanced surveillance from […]
As 2014 ends and the new year begins, business and technology experts are looking at online business trends. A number of high-profile security breaches have led to significant shifts in consumer behavior, especially when it comes to online shopping and the types of businesses that they purchase from. A recent survey shows that many online […]
The word “hacker” strikes fear in the heart of many businesses and web hosting companies, and rightfully so. Hackers have become a major threat to websites, causing downtime, launching viruses or malware, and even stealing vital company information or customer data. In order to foil hackers, you must have, and maintain, the highest level of […]
As our everyday lives become more digital, passwords are becoming essential—and as passwords become ever more important, more and more password management tools have appeared to help you keep track of them. But can online password management sites really keep all of your most important data safe or are they just one more way to […]
These days, many web security experts say that there are only two types of businesses left in America: those that have experienced a breach and those that don’t know they have. The same can be said for most individuals in the United States. With hacking becoming practically commonplace, most people are unaware of how insecure […]
In response to the air strikes and military presence brought about by the United States, the FBI has issued a warning that ISIS and other extremist groups may initiate cyber attacks in retaliation. While they are stating that the recent threats are “nonspecific and probably aspirational”, there are several reasons why Americans should be concerned […]
International concerns over Chinese policies and procedures are nothing new. Yet with the growth of the Chinese economy to becoming where it stands today as the biggest in the world, new concerns have arisen regarding exactly how far Chinese influence will continue to be felt in the international business market.
Each and every day, more and more companies are migrating much of their data storage and transmission to the cloud. Those organizations joining in this movement have plenty of evidence to support their decisions. Cloud computing offers a more cost-effective way to manage your vital business data, while transitioning that data to the cloud provides […]
The April 2014 uncovering of Heartbleed marked the discovery of one of the most serious zero-day vulnerabilities found in Internet history. Before the general public was made aware of the Heartbleed bug, the risks had been analyzed, and fixes were released the same day of the announcement. A team of engineers at Google decided to […]