Though many in IT focus on external threats, I believe that the ‘enemy within’ may be just as damaging. Addressing the human element, both malicious and unintentional, may generate some of the greatest returns on security investment. Counter to conventional wisdom, the majority of breaches are not due to malicious intent. According to Ponemon, 52% … continue reading
Despite efforts to promote and encourage good cybersecurity practices, Internet users continue to put themselves at risk. SplashData has released its annual Worst Passwords of 2015 list, and it revealed that “123456” and “password” still top the list as the most commonly used passwords, and they have been on the top since 2011. Other passwords … continue reading
The Federal Trade Commission (FTC) is penalizing Oracle for leaving millions of computers vulnerable to hacking. As a result, Oracle will be required to give consumers an easy solution to uninstall insecure and older versions of its Java Standard Edition (Java SE) software. According to the FTC, when Oracle acquired Java back in 2010, it … continue reading
Smartwatch users might want to think twice about the information they plug into their wearable device, as a recent study from HP revealed a majority of these technologies have serious security flaws. “Smartwatches have only just started to become a part of our lives, but they deliver a new level of functionality that could potentially … continue reading