About Charlie Hilton

This author has not yet filled in any details.
So far Charlie Hilton has created 84 blog entries.

Understanding the IoT Convenience/Security Tradeoff

By | October 8th, 2015|Identity Protection, Industry News|

If you’ve been to a music festival recently, you may have noticed something convenient about your wristband. Sure, it serves its main purpose of getting you into the event, but with recent technology, it now has the capability to do quite a bit more. Take for instance Austin City Limits music festival, which took place [...]

Industry News Recap: Connected Automobile Security

By | September 30th, 2015|Industry News|

Two weeks ago we published a blog on security in the Internet of Things, part of which addressed recently uncovered vulnerabilities in automobile software. Since that time, concerns about cars and cybersecurity have remained in the news. Hacked cars have made headlines before, but the issue was recently thrust back into the spotlight when white [...]

SYNful Knock and a New Age of Phishing

By | September 21st, 2015|Uncategorized|

Earlier this week, Reuters reported that security researchers uncovered a new malware strain called SYNful Knock, targeting Cisco routers. Once installed, SYNful Knock gives cyber criminals the ability to harvest data being shared via the router without being detected. The malware has already been found on a handful of Cisco routers in four different countries. [...]

Securing All the Things: IoT Myths and Realities

By | September 4th, 2015|Uncategorized|

The Internet of Things isn’t a new concept – but it’s certainly one that has gained momentum, particularly within the last year. Recently, we’ve seen more and more connected devices come to market. While connecting our world may bring added convenience to our everyday lives, it’s important to question what we may be sacrificing from [...]

Industry News Recap: Zero-Day Exploits In The Limelight

By | August 28th, 2015|Uncategorized|

A large amount of tech coverage has recently been devoted to zero-day vulnerabilities and attacks and the industry’s widespread attempts to stop them. The average Internet user has never encountered the term “zero-day attack” but it’s one that we are going to hear more about in future. A zero-day attack occurs when a hacker exploits [...]

The Rising Cost of Data Breaches

By | August 20th, 2015|Breach, Business Security, Uncategorized|

Earlier this week, Target struck a deal with Visa to reimburse thousands of financial institutions around $67 million dollars for costs resulting from the company’s 2013 data breach. These costs included reissuing credit and debit cards and handling an increased number of customer inquiries. Target is expected to reach a similar deal with MasterCard. Target’s [...]

When Good Passwords Go Bad

By | June 19th, 2015|Uncategorized|

Last month, password manager LastPass announced that their system had been hacked, exposing email addresses and encrypted master passwords for its users. Users were notified and prompted to change their master passwords. Shortly after news broke of a flaw found in Apple’s Keychain software that could let malicious software steal passwords across apps on your [...]

IRS Breach Shows What Happens to PII After it is Sold on the Black Market

By | May 29th, 2015|Breach, Uncategorized|

The IRS experienced a breach that is changing the way businesses and consumers think about personal information. Reporters attribute the IRS breach to a crime syndicate in Russia, who used personal information obtained elsewhere to exploit the Get Transcript feature on the IRS website. They successfully exploited 104,000 individuals and filed nearly $50 million in [...]

Healthcare Data Breaches Have Grown 125 Percent in Five Years

By | May 26th, 2015|Breach, Uncategorized|

There has been a noticeable uptick in the number of criminal attacks against healthcare facilities in the last five years. Ponemon recently released its Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data, which shared a 125 percent increase in cyber attacks targeting healthcare data. The major shift in healthcare data breaches, according [...]

Digital Wallets in the Crosshairs

By | May 15th, 2015|Uncategorized|

Digital wallets have been a hot topic for us lately. Their use is growing and like all things when it comes to cyber security, online criminals always follow the money. Kaspersky Labs said it best:“Enthusiasm over this new payment platform (Apple Pay) is going to drive adoption through the roof and that inevitably attracts many [...]

Load More Posts