Last year the Internet focused on the much-reported backpack video of a woman being catcalled more than 100 times in three hours of walking around New York City. In that instance, the viral video showed us through digital devices the kind of harassment women--or at least women living in cities-- have to deal with every day. Yesterday, however, that harassment was taken to a new level. Mashable reported that a woman in London was a victim of “cyber flashing,” a term that might not be familiar to most people.
Recently shaken by a security scandal involving mobile devices that could be hacked by a malicious text message without owners being aware of it, Google has promised to make efforts to regularly update the security systems of its Android operating system. While this is a step in the right direction, actually improving Android security is a complicated endeavor.
These days, Facebook hacking is a pretty commonplace activity. Given this, Facebook has released an updated “ Security Checkup ” tool that will prompt all users to review and update their security settings to ensure they’re aware of who’s accessing their accounts and what apps they’ve given permission to utilize their information.
Using stolen data, cyber-criminals have accesses past tax returns for more than 100,000 people. How did they do it? They gained access to IRS records through an application on the IRS website. The IRS sent the criminals about $50 million in refunds before it detected the fraud.
This week I moderated another Social Media Today webinar as part of their Best Thinker webinar series, this time on the topic of Protecting Your Brand: Privacy, Risk and Compliance. This webinar was sponsored by Tracx and featured speakers from PwC, Actiance, and Tracx. We discussed the risks in social media which we so often ignore.
Have you ever worried about having your website hacked? According to Forbes, 30,000 web sites are hacked each day. These vulnerable sites can be infected with malicious code looking to suck the SEO score from your URL .
What happens if someone manages to hack into one of these building automation devices and gains control over the locks of a building? What about if they are able to gain access to automatically update logs about what actions the device performs and the time of day in which they occur? As you can see, this could pose a serious threat.
Has your business recently suffered a cyber-attack? Don’t panic. With this response guide, you can minimize the damage you suffer – and prevent a second attack. It’s news no server owner ever wants to hear. There was a flaw in your security - and somehow, a criminal managed to sneak their way in. Your business’s information has been compromised - and very likely fallen into unsavory hands.