• White Hat Hackers Ferret Out Vulnerablities

    In an interview on the CyberVista site, Debby Chang of HackerOne discusses ethical (white hat) hacking. Ethical hackers are often employed by companies that fear their cybersecurity systems have left vulnerabilities unpatched and use White Hats to...

    • Posted 3 days ago
    • 0
  • Study Finds One In Four Phishing Emails Gets Past Office 365 Security

    About one percent of all emails are phishing attacks, and, per a recent study, 25 percent of those emails are able to get past a security tool that’s built into Office 365. The Global Phish Report from...

    • Posted 3 days ago
    • 0
  • A “Chilling Caution” On Expectation Of Privilege, From A Blackberry Case

    The market analyst’s report was bad news for BlackBerry, coming shortly after the company released an updated smartphone in 2013. The report said that following the rollout of the product there had been by an extraordinarily high...

    • Posted 1 week ago
    • 0
  • California’s Sweeping Privacy Act Has Lookback Provisions

    A blog on the threat stack site provides an overview of California’s Consumer Privacy Act (CCPA), passed on June 28, 2018 with the goal of increasing transparency, access, and control over a consumer’s personal information and stipulating...

    • Posted 1 week ago
    • 0
  • DLA Piper’s Big Cyber Insurance Dispute

    The law firm and insurance company Hiscox are at odds over a claim by the firm for millions of dollars in losses it said were caused by the NotPetya ransomware attack of 2017. A spokesperson from Hiscox...

    • Posted 2 weeks ago
    • 0
  • Office Depot Settles, After FTC Alleges “PC Health Check” Scam

    Office Depot and a California computer technical support company teamed up to dupe office max customers into buying computer clean-up procedures they didn’t need, according to an FTC complaint . To settle the matter, the companies have...

    • Posted 2 weeks ago
    • 0
  • Nothing Safer Than Downloading A System Update, Right?

    Hackers using a fake authentication certificate got thousands of Asus computer owners to download what appeared to be a software update but was actually malicious code. The breach was discovered by cybersecurity firm Kaspersky, which estimates the...

    • Posted 2 weeks ago
    • 1
  • Law Firm Couldn’t Get Its Hijacked Money Back

    To facilitate the closing of a real estate deal, the lawfirm as supposed to forward money to Deutsche Bank, per the payoff instructions of the mortgage and real estate services company, but unbeknownst to the law firm...

    • Posted 2 weeks ago
    • 0
  • Watchful Eyes On A Disputed Cyber Insurance Claim

    A case in the Illinois courts has drawn the attention of many legal and risk managers, and a variety of commentators. A Fortune 500 company that fell victim to the so-called NotPetra ransom attack of 2017 –...

    • Posted 3 weeks ago
    • 0
  • Easy Inexpensive Ways to Fight Cyber Attacks

    Cybercrime is evolving fast but there are easy, cost-effective and proven ways to prevent attacks, or at least mitigate the damage they cause. Two factor authentication (2FA) is one of the easiest. It means a user must...

    • Posted 3 weeks ago
    • 0