Blog Posts Tagged with "Consumers"

37d5f81e2277051bc17116221040d51c

Holiday Headaches Coming for Consumers

December 01, 2011 Added by:Robert Siciliano

When handing your card to a clerk or cashier, pay close attention. The card should be swiped through a point of sale terminal or keyboard card reader once, maybe twice. If your card is swiped through an additional reader, the card number may have been stolen...

Comments  (0)

D15e0b682a84587af9af463961d00f22

e-Commerce Risks for Cyber Monday and the Holidays

November 28, 2011 Added by:John Nicholson

To deal with the potential volume, they can turn to cloud-based services to add capacity and prevent the site from crashing, but as we'll discuss below, the availability commitments made by many cloud services create their own risks...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Three Words to Describe Enterprise Security

November 16, 2011 Added by:Rafal Los

We're cynical. Many security professionals and information security management alike are getting fed up with vendors who don't take the time to understand the issues they're facing - and simply to to sell, sell, sell...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

MMA Proposes Mobile Application Policy Framework

November 16, 2011 Added by:David Navetta

The Mobile Marketing Association has released its Mobile Application Privacy Policy Framework for public comment, which they are accepting through November 18th. The intent of the Guidelines are to create a framework for developers to use to provide clear disclosures to consumers...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Consumers Need to Rethink IT Security and Safety

November 16, 2011 Added by:Robert Siciliano

The threat of lost or stolen devices and the possibility of their personal information being used for fraudulent means a significant concern. In the United States 113 mobile phones are lost every minute and more than half of smartphone users do not use any password protection...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

The Credit Score Ripple Effect on Your Identity

November 08, 2011 Added by:Kelly Colgan

The Wall Street Journal reports that “the proliferation of ‘scores’ highlights the widening trade in personal information, which is already fueling public concern about diminishing personal privacy...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

California Restricts Use of Consumer Reports in Hiring

October 25, 2011 Added by:David Navetta

With the wind blowing on state and federal level against use of consumer reports for employment purposes, employers should review their HR policies to ensure that they collect consumer report information only in accordance with state and federal requirements...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Are Your Digital Assets Worth?

October 21, 2011 Added by:Robert Siciliano

According to Consumer Reports, malware destroyed 1.3 million personal computers and cost consumers $2.3 billion in the last year. With the increased popularity of tablets, smartphones, and Macs, threats are becoming both more common and more complex for non-PC devices...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Consumers: Just Looking for a Digital McDonalds

October 10, 2011 Added by:Javvad Malik

Unlike the comparatively simple topic of world politics, information security is not just the responsibility of the government or companies. Users need to be educated so that they are best equipped to protect their own data and to allow them to put pressure on companies who don’t protect data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Citigroup Faces Class-Action Lawsuit for May Breach

October 10, 2011 Added by:Headlines

“Defendants have taken no steps that adequately or effectively protect cardholders against illegal use of the cardholders’ sensitive and extensive financial records since the breach,” the suit states. Officials estimate that $2.7 million was stolen from 3,400 accounts in the attack...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Targeting Small Businesses

September 16, 2011 Added by:Robert Siciliano

Big companies and big government get big press when their data is breached. When a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, however, victims are often in the dark, regardless of the state laws requiring notification...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senator Seeks Punitive Model for Data Security Laws

September 14, 2011 Added by:Headlines

The devil is in the details with these laws. But there are a number of questions here... These companies are already victims in these attacks, so why are we penalizing them after a breach? I think that's because it's easier to issue fines than it is to track down the criminals and go after them..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

How is All This Hacking Affecting My Identity?

September 13, 2011 Added by:Robert Siciliano

With so many different breeds of hackers, each with their own agenda, the media has certainly been more than willing to give them all the attention they could possibly want. Much of it has been sensationalist, but the reality is that we are indeed hemorrhaging information all over the place...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Consumers Still Prefer Convenience Over Security

August 24, 2011 Added by:Headlines

"Any change to the way a customer accesses their account is going to take a while to get used to. But this small extra step delivers such an increase in security to our internet banking users, that we are confident we have got the balance right," an HSBC official said...

Comments  (4)

37d5f81e2277051bc17116221040d51c

Standards Will Bring Mobile Payment Security

August 09, 2011 Added by:Robert Siciliano

The mobile carriers want to control near-field communication and mobile payment fees by maintaining control over the phones payment technology containing their users’ credentials. Meanwhile, consumers crave mobile payment and must adapt until the big guys fight it out to see who ends up top dog...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

Don't Lose Customers Over a Data Breach

July 28, 2011 Added by:Javvad Malik

Your competitors are taking advantage of your weakened state and swooping in on your customers, wooing them with offers too good to resist and promising them a life of security they deserve which you could never provide. Is there anything you can do to stem your losses?

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »