Posts Tagged: "hacked"

Oracle Settles FTC Charges of Deception About Java Updates

Yesterday the Federal Trade Commission (FTC) announced that Oracle has agreed to settle charges that it deceived consumers about the security provided by updates to its Java Platform, Standard Edition software (Java SE), which is installed on more than 850 million personal computers. The FTC will now publish a description of the consent agreement in the Federal Register. The agreement will be subject to public comment for 30 days, beginning yesterday and continuing through Jan. 20, 2016. Thereafter the Commission will decide whether to make the proposed consent order final, which is typically the outcome.

In the face of growing e-commerce fraud, many merchants not prepared for holidays

As card-present transactions become less susceptible to fraud because of the shift to EMV chip card technologies, it’s expected that more fraud will shift to online platforms where it’s still relatively easy to input fraudulent financial information without being noticed; some reports indicate that online retail fraud in the U.S. alone is expected to rise by 106 percent in three years after October’s EMV liability shift from banks to business owners. One way that businesses conducting sales online can get themselves ready to respond quickly to fraud is through effective planning prior to major sales events like Black Friday or, perhaps more important when thinking about e-commerce, Cyber Monday. If those workers handling fulfillment of online orders are more aware of expected sales projections, it will help them be more aware of clues that the business might be a target for fraud if actual sales figures differ wildly.

Cyber Security: How to Protect Your Data Over Wi-Fi

The same technology that makes it easy for you to stay in touch with the office also makes it easy for nefarious individuals to hack your communications and into our devices. Because office computers are generally connected to the same network if a hacker is able to gain access to one machine that shares the network connection they can potentially, and sometimes quite easily, gain access to all of the machines and information on the network. What this means is that computers on the same Wi-Fi network can potentially have access to any unencrypted information that pass through that network.

Businesses must switch to EMV card readers to avoid shift in fraud liability

By the end of 2015, about 40% of all credit and debit card transactions will use EMV cards. To process payments on EMV cards, businesses must upgrade to new card processing or point-of-sale technologies.

A lax attitude towards data security could leave law firms in the lurch

Law firms are coming under growing scrutiny for a lack of effort in addressing hacking concerns or even coming clean with the threats which they have faced. A cybersecurity report released in February of this year by Citigroup Inc. (NYSE:C) lambasted law firms for being at high risk for cyber intrusions while the industry standard for cybersecurity remains much lower than for other industries. Law firms who deal with incredibly valuable intellectual properties should be acutely aware of the risks that they face from hackers, especially those from overseas. Patented technologies have been the target of international hackers in recent months. Just this May, the U.S. Justice Department charged six Chinese nationals with stealing IP related to wireless technologies developed by a couple of American companies.