
ORANGE PARK, Fla. -- Cyber thieves targeted the town of Orange Park and almost get away with nearly half-a-million dollars.
Town manager Jim Hanson said the money was stolen from the town's Wells...
The Internet of Things will generate in the retail sector US $ 329 billion of revenues by 2018 according to a report published by SAP, but such massive growth has to deal with legal issues concerning...
Feature The emergence of the Internet of Things has analysts in a froth predicting that by 2020 homes will be awash with clever connected appliances. We’re not talking tablets and TVs here,...
With the year of the data breach behind us, the new trend in cybersecurity is the growth of the Internet of Things — the devices around you that you use in your daily life that also record data and...
An increase in cyber security attacks across commercial enterprises and service providers, and a consumer market wary of data privacy and protections, provide a backdrop for the forthcoming data...
Target has revealed that the cost of the cyber attack on its systems in 2013 that led to the theft of millions of customers' credit card details has reached $162m.
The retailer revealed the figure...
Insurers need to boost their security knowledge amidst the growing risk of cyberattacks.
Although Sony seemed to dominate the cyber-security headlines of 2014, it was just one of many corporations...
Social media posts have a huge impact on people. In fact, social media is revolutionizing the way humans communicate. On a daily basis, millions of people use social media for personal and business...
Public Service Announcement
Prepared by the Internet Crime Complaint Center (IC3)
January 22, 2015
Alert Number: I-012215-PSA
BUSINESS E-MAIL COMPROMISE
The...
Smart grids – electrical grids that allow two-way communication between utilities and consumers – represent an exciting frontier in the Internet of Things, with ramifications for energy...
By a News Reporter-Staff News Editor at Bioterrorism Week -- Erik Matson, a Partner with Boyden global executive search in New York, will address an audience of top insurance and...
A lawyer who clicked on an email attachment lost $289,000 to hackers who likely installed a virus that recorded his keystrokes.
The anonymous lawyer, identified only as John from the San Diego area,...
You could almost guarantee that all products at CES this year were connected to the internet.
At the beginning of the year I was one of the 170,000 delegates who attended the Consumer...
As we move closer to a world of self-driving cars, it is important for companies involved in their manufacture to consider cyber insurance policies to provide coverage for the risks...
Cyberattacks are on the rise, and no method is proving more resilient and effective in the United States than "phishing" scams.
Phishing, sometimes called spoofing, is a way to trick someone...
Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to...
In honor of Valentine’s Day, let’s celebrate the many ways in which privacy is sexy. Just like Justin Timberlake once encouraged us to "bring sexy back," how can we "bring privacy back" into our...
Optimizing insurance programs to act as a hedge to protect corporate financial objectives enables insurance buyers to deliver insurance programs that are superior in value and efficiency. Using...
In the mid-2000s, U.S. property insurers underwent an intensive effort to analyze their books of business for over-concentration of risks, particularly along the nation’s coastline. Insurers worried...
As a Human Resources professional, I have learned (sometimes painfully) of the need to be “security aware” regarding the data for which I am responsible.
Today’s HR departments house vast...