With tighter post-financial crisis regulation on larger amounts of money, and safer chip-enabled debit and credit cards, fraud has shifted to a new target, gift cards.
Jen A. Miller |
04 May |
Read more
The U.S. infrastructure is outdated and vulnerable to cyberattacks. If government reaction doesn’t improve the country electrical could be crippled.
Jen A. Miller |
09 Sep |
Read more
The short answer: They’re targeting sites in North America, where they’re planting malware in ad networks and launching dating site spam.
Jen A. Miller |
23 May |
Read more
What’s keeping CIOs awake at night? From data breaches to social engineering, there’s plenty to keep tech types tossing and turning.
Jen A. Miller |
25 Apr |
Read more
If IT leaders and IT workers can’t agree that there’s a problem, what are the chances that they’ll actually implement the cybersecurity policy they need?
Jen A. Miller |
11 Apr |
Read more
Social engineering and ‘download this attachment’ scams are back – as if they ever left – and working better than ever, unfortunately.
Jen A. Miller |
25 Mar |
Read more
From social engineering before you even get on the plane to apps that are riddled with security holes, it’s never been easier for cybercriminals to target unsuspecting travelers.
Jen A. Miller |
29 Feb |
Read more
When Wallaby Financial launches a new version of its app, which helps users maximize rewards and points, later this summer, it will be missing one notable feature: a password.
Jen A. Miller |
06 Aug |
Read more
Ah summer: the time for cookouts and fireworks and long days at the beach trying not to check your email. It's also a time to finally use all those airline miles and hotel points you've accumulated to get a free place to stay and free transportation to get there.
Jen A. Miller |
10 Jul |
Read more
A few weeks ago, I got two fat envelopes in the mail. Each one held a new credit card inside along with instructions on how to use that card. Then, when I stopped at my local grocery store, at Nordstrom, even the corner liquor store, each had a new reader with a slot at the bottom into which I could slide those new cards.
Jen A. Miller |
11 Jun |
Read more
When a company invests thousands of dollars in security software, you'd expected the product to be used to protect the company.
Jen A. Miller |
28 Feb |
Read more
'Tis the season to be scamming.
Jen A. Miller |
27 Nov |
Read more
As details filter out about the Home Depot hack (and many, many more data breaches), you can't help but ask: How did this happen -- especially when the company was supposed to adhere to specific safety regulations or else lose its capability to process credit card transactions?
Jen A. Miller |
23 Oct |
Read more
Is that email really from your bank or airline? Or a hacker pretending to be?
Jen A. Miller |
03 Sep |
Read more
Small and medium-sized businesses may think they're immune to the kinds of attacks that wreaked havoc on Target last year, but they're susceptible to the same nefarious forces -- sometimes even more so, as they can lead hackers to a bigger prize.
Jen A. Miller |
09 Jul |
Read more