App developers, like all software developers, like to integrate existing code to reduce their workload and their time to market. Unfortunately, that does not mean that developers will follow the best practices in using that existing code. According to a presentation at Black Hat Europe this week, developers who use BaaS or Backends as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Malvertising is the term that describes taking advertising that appears on legitimate web sites and turning it into weapons. In almost all cases, the web sites involved have no knowledge of what is going on. Web sites buy ads from large ad networks such as Google and AOL. Those ad networks sign up advertisers so […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Mobile is the future of the world – at least the digital world. But digital brings with it a set of risks that the old 25 pound desktop computer in the office does not and we need to consider the implications of that. The article (below) is specifically geared toward lawyers and California lawyers in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many of you will remember that J.P. Morgan Chase was breached last year and the information on 76 million customers and 7 million businesses was taken. The information included name and address information, but did not contain very much non public personal information. Well, we are now hearing more information. The U.S. Attorney for the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A Wells Fargo survey of 100 large and mid market companies found that 85% have purchased cyber insurance and more than 4 in 10 have already filed a cyber insurance claim. While that survey didn’t ask how much the claims were for, a NetDiligence study says the average claim is about $5 million. There are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Two new studies this week give us some insight into how government at all levels is doing at protecting their – excuse me – our information. First the Feds. Here are some disturbing stats from a MeriTalk/Palo Alto Networks study: Federal IT Managers estimate at 44% of the endpoints that access agency network are at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]