Passwords are worth their weight in gold to hackers. Once a cyber criminal figures out an employee’s password, he has an entry into the company network. From that point, using other tools, the hacker can steal just about anything he wants, and wreak havoc in the...
Hackers have a variety of ways to unleash cyber attacks on individuals and businesses, and they use their nefarious toolbox each and every day to steal sensitive information. According to Symantec’s 2011 Cybercrime Report, the daily cost of hacking in the US is a...
The nation is woefully unprepared for a major cyber attack, according to a new report released by the Federal Emergency Management Agency (FEMA). Among 31 core capabilities identified as key for disaster responsiveness, cyber security came in dead last, with a...
When it comes to cyber risks, attorneys are often found litigating on behalf of clients who have been crime victims and are suing the company that the criminals hacked. However, sometimes, attorneys themselves fall victim to cyber criminals. Like any other business,...
How much of your personal information should a merchant be allowed to collect? What information does a merchant have a right to gather from you when you pay with a credit card? Should a merchant be barred from obtaining your zip code on the grounds that it is...