Social networking sites typically suffer hack attacks the most, but e-commerce sites are not far behind when it comes to hacking and identity theft nightmares. If you run an e-commerce site, click to find out tips to safeguard your hard-earned money, prevent hacking on your site, and protect your data and computing environment from malicious hackers or crooks.
receive privacy industry news
- No Featured
questions + feedback
Have a question or a privacy issue that you'd like us to investigate ? Send an to our editors with your comments.
If you own your own business -- or work for a business that has suffered a data breach -- the damaging effects of even one breach can be long-lasting, according to a new Ponemon Institute report. Companies that suffer a data breach are not only facing expensive direct costs from cleaning up a data breach, but also a loss in customer confidence that has long-lasting ramifications. In fact, the global study shows the United States has the most expensive data-breach incidents caused by malicious or criminal attackers -- at $277 per record!
Click to learn the other true costs of data breaches -- and also check out a calculator that lets you determine your data-breach risk based on your organization's characteristics.
As an in-depth Huffington Post article points out, it's no wonder celebrities are often victimized by hackers. The reality is, it's just not that hard to hack celebrities -- or anyone else, for that matter.
Indeed, among the five security tips shared in the article, two are suggestions that this website has repeatedly recommended and warned about over the years. For example tip #4 warns about the dangers inherent in wireless networks and tip #5 warns about malicious spyware that can infect your computer and compromise security: Read More
Several interesting details have emerged from the "Global Risks for 2012" report -- which shows cyber attacks on governments and businesses are considered to be one of the top five risks in the world. Be it cybercrime, cyber-espionage or cyberwarfare -- they are on a steady rise.
SSL -- the security layer used by banks and online retailers to secure communications between the website and the user -- is coming under fire yet again. A new report from Wired says there is a new hacking tool that exploits a known flaw in the SSL protocol by overwhelming the system with secure connection requests. As the article says, this quickly consumes server resources. Read More
CNN reports that more than 760 organizations -- including IBM, Intel, Facebook, Amazon, and Google -- had a breached "command and control" server, the name for a machine that hackers use to direct the fleets of compromised PCs that they have gained control over. As the CNN article notes, most companies don't like admitting that they've been compromised, but the fact is most companies are likely just finding out they've been hacked at all. Read More
An even less-ethical TMZ? Have you heard of Hollywood Leaks, a new band of hackers that has been breaking into entertainment industry insiders' email accounts and leaking what they find, including nude photos, phone numbers, and movie scripts? The hackers aren't particularly skilled, according to this article on Gawker, which says they've broken into accounts mostly by guessing bad security questions. Read More
Computer hackers can force some cars to unlock their doors and start their engines without a key by sending specially crafted messages to a car's anti-theft system. They can also snoop at where you've been by tapping the car's GPS system. Find out why this is possible in this Yahoo! Finance article, which also says such attacks are possible on a variety of other devices that use wireless communications chips. Those include ATMs, medical devices, and even traffic lights. Read More