Posts Tagged: "hacked"

Oracle Settles FTC Charges of Deception About Java Updates

Yesterday the Federal Trade Commission (FTC) announced that Oracle has agreed to settle charges that it deceived consumers about the security provided by updates to its Java Platform, Standard Edition software (Java SE), which is installed on more than 850 million personal computers. The FTC will now publish a description of the consent agreement in the Federal Register. The agreement will be subject to public comment for 30 days, beginning yesterday and continuing through Jan. 20, 2016. Thereafter the Commission will decide whether to make the proposed consent order final, which is typically the outcome.

In the face of growing e-commerce fraud, many merchants not prepared for holidays

As card-present transactions become less susceptible to fraud because of the shift to EMV chip card technologies, it’s expected that more fraud will shift to online platforms where it’s still relatively easy to input fraudulent financial information without being noticed; some reports indicate that online retail fraud in the U.S. alone is expected to rise by 106 percent in three years after October’s EMV liability shift from banks to business owners. One way that businesses conducting sales online can get themselves ready to respond quickly to fraud is through effective planning prior to major sales events like Black Friday or, perhaps more important when thinking about e-commerce, Cyber Monday. If those workers handling fulfillment of online orders are more aware of expected sales projections, it will help them be more aware of clues that the business might be a target for fraud if actual sales figures differ wildly.

Cyber Security: How to Protect Your Data Over Wi-Fi

The same technology that makes it easy for you to stay in touch with the office also makes it easy for nefarious individuals to hack your communications and into our devices. Because office computers are generally connected to the same network if a hacker is able to gain access to one machine that shares the network connection they can potentially, and sometimes quite easily, gain access to all of the machines and information on the network. What this means is that computers on the same Wi-Fi network can potentially have access to any unencrypted information that pass through that network.

Businesses must switch to EMV card readers to avoid shift in fraud liability

By the end of 2015, about 40% of all credit and debit card transactions will use EMV cards. To process payments on EMV cards, businesses must upgrade to new card processing or point-of-sale technologies.

A lax attitude towards data security could leave law firms in the lurch

Law firms are coming under growing scrutiny for a lack of effort in addressing hacking concerns or even coming clean with the threats which they have faced. A cybersecurity report released in February of this year by Citigroup Inc. (NYSE:C) lambasted law firms for being at high risk for cyber intrusions while the industry standard for cybersecurity remains much lower than for other industries. Law firms who deal with incredibly valuable intellectual properties should be acutely aware of the risks that they face from hackers, especially those from overseas. Patented technologies have been the target of international hackers in recent months. Just this May, the U.S. Justice Department charged six Chinese nationals with stealing IP related to wireless technologies developed by a couple of American companies.

Banks struggle to keep up as cybersecurity risks increase

Regulations will likely start rolling out in the coming year starting at the state level. In May of last year, for example, the New York State Department of Financial Services released a report which said that the agency would add cybersecurity measures to the list of items that it investigates when evaluating a bank’s overall safety and soundness. New York, and New York City in particular, is home to a huge banking industry that represents some of our nation’s largest financial institutions, including American Express, JPMorgan Chase, Goldman Sachs and Merrill Lynch. According to remarks made by NYS DFS Superintendent Benjamin Lawsky in late February, state regulations could involve the use of multi-layer authentication systems for firms regulated by the DFS.

Data Security Systems and the Prevention of Identy Theft

Home Depot may be the latest and largest breach to become news, but it’s certainly not the only one and hacking activity seems to be ramping up in the past few months. Malicious software known as Backoff, responsible for the Target breach, has also been identified as a potential culprit in recent breaches at Dairy Queen, Supervalu and United Parcel Service. Law enforcement officials have theorized that an Eastern European group may be responsible for a majority of these breaches because of links to Ukraine in the malware’s code… [R]ecent data breaches at major corporations have agitated some financial technology developers to look for more secure options for conducting transactions without cash. Many are touting a new wave of debit and credit cards which have microchips that improve data security as a possible answer.

How to Respond to Cyber Attacks on Your Business

Identity theft, and the various cyber attacks undertaken to accomplish this crime, are somewhat related to infringements of intellectual properties that we cover here at IPWatchdog. The top asset that any company has is their good name, and much like a trademark that has become compromised, it’s very difficult for an individual to fix misappropriation of their identity even when it’s the fault of a malicious hacker. But as deeply troubling as it is for individuals to have their identity stolen it can be equally crippling for the businesses who allow for sensitive personal information to be taken by nefarious actors. Most businesses simply cannot afford to have their good business name associated with a cyber attack.

Aaron’s Rent-To-Own Settles FTC Computer Spying Charges

How is it possible that no one is going to jail for this? How is it possible that there were no fines levied by the FTC? According to the FTC’s complaint, Aaron’s franchisees used the software, which surreptitiously tracked consumers’ locations, captured images through the computers’ webcams – including those of adults engaged in intimate activities – and activated keyloggers that captured users’ login credentials for email accounts and financial and social media sites. Under the terms of the proposed consent agreement with the FTC, Aaron’s will be prohibited from using monitoring technology that captures keystrokes or screenshots, or activates the camera or microphone on a consumer’s computer, except to provide technical support requested by the consumer.

Twitter Faces Security Issues Again and Again

Essentially what it sounds like is that by getting you to sign into your twitter account, the scammers are able to look for patterns between the accounts you sign into using a form of spyware. If you use the same or similar passwords on websites of different kinds, chances are you are using the same or similar login for all of your accounts.