Let me cut to the chase – the answer is no. It is a way to help pay for the damage, but that is about all. In the article referenced below, the author thoughtfully explains the role of cyber risk insurance – a post-fail risk offset. The key word there is fail. Failing in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
How much does cyber crime cost us anyway? I rant about it all the time, but really, in dollars, what does it cost? Different researchers give different answers and your mileage may vary, but here are some answers: Cybercrime makes, AT LEAST, $1.5 trillion more than the drug trade Cybercrime would rank as the 13th largest economy […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Well it seemed like the whole damn country. Over 15,000 website have been hacked, including, not surprisingly, newspapers, government offices and TV stations. After the sites were defaced by the hackers, they were taken offline. Newspapers said it was the biggest attack in the country’s history, even bigger than the 2008 attack by Russia. This […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No, this is not an Apple-bashing post, just coincidence. The problem could just as easily happen to an Android user. The short answer to the question in the subject of this post is, apparently, at least according to the courts in London. Here is the story. Jemima is a digital convert. She is a resident […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
These are the words right out of the mouth of Katie Arrington, The Pentagon’s Chief Information Security Officer for the acquistion policy office. Katie reports up to Kevin Fahey, the Assistant Defense Secretary for Acquisition. He is the guy who is responsible making sure that the Pentagon spends those hundreds of billions of dollars a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most of you have probably seen or heard of the threatening email that starts with “Hi, I know one of your passwords is: xxxxx“. The email goes on to say that the email writer has infected the recipient’s PC, including access to the recipient’s webcam. The attacker claims, by virtue of installing the malware on […]
Continue reading →
[DISPLAY_ACURAX_ICONS]