One of the first mobile apps from a third-party to launch on the iPhone was Fandango, a service that allows you to buy movie tickets from your phone. Simple, useful,…
In my last post, we discussed how the FTC used its powers in commerce to protect customers from cybersecurity threats. We specifically looked at the case FTC versus Wyndham Worldwide…
In this series of blog posts, I’ll be looking at the Federal Trade Commission (FTC) charges against companies in the area of cybersecurity practices that put consumers at risk. The…
While cyber-attacks cannot kill tens or hundreds of millions of people in a single action, they are more dangerous in other ways. One particular way would be to silently undermine…
We’re continuing in our series of blog posts that cover some of the most common questions I get asked about cybersecurity. Here are the last few weeks of questions in…
People often ask me questions about cybersecurity. Over the next several weeks I’m going to share some of these questions here. Q: What should I look for when shopping for…
In previous posts, I’ve explained how cybercrime is big business, and the criminals behind the illegal activity run sophisticated online companies. Today, let’s begin talking about how to defend your…
In recent weeks I’ve been talking about the millennial mobster and the reality that savvy international businesses make up the majority of cybercriminals. This blog post is the final week…
Last week I introduced you to the Millennial Mobster and talked about The Internet Age of Criminals. I explained that the typical hacker is not who our media portrays in…
The following is adapted from Fire Doesn’t Innovate. Ransomware is one of the nastiest types of cyberattacks. When ransomware infects your computer, its first directive is to encrypt all of…