
The business of cybersecurity and cyber crime – Pt. 2
There are many types of cyber attacks. They all have one malicious goal: steal sensitive information. Cyber attacks are estimated to cost the world $1 trillion in losses, around 1%
There are many types of cyber attacks. They all have one malicious goal: steal sensitive information. Cyber attacks are estimated to cost the world $1 trillion in losses, around 1%
Cybersecurity is a modern concept and has changed the traditional definition of security. With the advent of the internet and the world wide web, malicious actors began using the internet
As reported in the first part of a series on the financial exploitation of U.S. seniors, financial scams targeting U.S. seniors will continue to grow as the U.S. population ages.
With Coronavirus spreading across the U.S. and around the world, the pandemic could have serious economic implications over the next several months or years, not to mention the loss of
What do the recent arrests of three hackers in Indonesia have to do with U.S. consumers? Plenty. The three thieves are part of “Magecart,” a network of more than half
In August, Apple rolled out its first credit card marketed as protecting user privacy. The company stated that it will never see transaction data that’s sent to Goldman Sachs, its
In early October, Attorney General William Barr wrote an open letter to Facebook, urging the company to abandon plans to expand its use of end-to-end encryption (which ensures messages can
Baby boomers beat out tech-savvy millennials in guarding their online security, according to a survey of over 4,000 internet users from 18 to over 65 years old released on March
During a major data breach in December 2018, cybercriminals stole the names, addresses, phone numbers, email addresses, and passport numbers of up to 500 million people in the Starwood guest
For a timely story relating to data breaches, focus your reporting on tax-related scams, which increasingly threaten consumers’ financial security. The Internal Revenue Service (IRS) has issued a “dirty dozen”
As large-scale data breaches continue to proliferate, many companies are crowdsourcing their security in hopes of fixing system vulnerabilities before attackers exploit them. Many companies offer bug bounties to reward
Google is at it again with another innovation, and this time it’s on the hardware end of quantum computing, which could disrupt just about everything. Now could be the time
Get Two Minute Tips For Business Journalism Delivered To Your Email Every Tuesday
Two Minute Tips
Every Tuesday we send out a quick-read email with tips for business journalism. Sign up now and get one Tuesday.