The business of cybersecurity and cyber crime – Pt. 2
There are many types of cyber attacks. They all have one malicious goal: steal sensitive information. Cyber attacks are estimated to cost the world $1
There are many types of cyber attacks. They all have one malicious goal: steal sensitive information. Cyber attacks are estimated to cost the world $1
Cybersecurity is a modern concept and has changed the traditional definition of security. With the advent of the internet and the world wide web, malicious
As reported in the first part of a series on the financial exploitation of U.S. seniors, financial scams targeting U.S. seniors will continue to grow
With Coronavirus spreading across the U.S. and around the world, the pandemic could have serious economic implications over the next several months or years, not
What do the recent arrests of three hackers in Indonesia have to do with U.S. consumers? Plenty. The three thieves are part of “Magecart,” a
In August, Apple rolled out its first credit card marketed as protecting user privacy. The company stated that it will never see transaction data that’s
In early October, Attorney General William Barr wrote an open letter to Facebook, urging the company to abandon plans to expand its use of end-to-end
Baby boomers beat out tech-savvy millennials in guarding their online security, according to a survey of over 4,000 internet users from 18 to over 65
During a major data breach in December 2018, cybercriminals stole the names, addresses, phone numbers, email addresses, and passport numbers of up to 500 million
For a timely story relating to data breaches, focus your reporting on tax-related scams, which increasingly threaten consumers’ financial security. The Internal Revenue Service (IRS)
As large-scale data breaches continue to proliferate, many companies are crowdsourcing their security in hopes of fixing system vulnerabilities before attackers exploit them. Many companies
Google is at it again with another innovation, and this time it’s on the hardware end of quantum computing, which could disrupt just about everything.
Two Minute Tips
Every Tuesday we send out a quick-read email with tips for business journalism. Sign up now and get one Tuesday.