E-Commerce ALERTS - Archive 2010SPECIAL NOTE TO ALL VISITORS: More E-Commerce ALERTS Inside Our Archives:
|
COMPUTER USERS JEOPARDIZE SECURITY WITH POOR PASSWORD PRACTICESDecember 28, 2010
In the survey, 79 percent of American adults revealed they've used personal information as part of their online passwords. Furthermore, 26 percent said they've used the same password for important accounts such as email, online banking, shopping and social networking MORE |
FORTIFYING PHONES FROM ATTACKERSDecember 28, 2010
As consumers and companies embrace smartphones to do more of their computing, the wireless industry is taking its first steps to beef up security on mobile devices MORE |
GADGETS BRING NEW OPPORTUNITIES FOR HACKERSDecember 28, 2010
The arrival of Internet TVs, smartphones and other popular Web-ready gadgets will usher in a new era of threats by presenting easy targets for hackers MORE |
FIRESTORM OF PRIVACY ACTIVITYDecember 28, 2010
Two US federal agencies - the Federal Trade Commission and the Department of Commerce -have instituted initiatives in the past few weeks aimed at safeguarding personal information online MORE |
US FEDS PROPOSE TOUGH NEW RULES TO LIMIT ONLINE 'TRACKING'December 14, 2010
Wading into the increasingly contentious debate over online privacy, the US Federal Trade Commission said Internet users ought to be able to easily block others from monitoring their online activity -- a move that could curtail the ability of advertisers such as Google to sell lucrative targeted ads to users MORE |
71% OF UK ORGANIZATIONS SUFFERED A DATA BREACH IN THE LAST YEARDecember 14, 2010
The fifth annual survey by the Ponemon Institute and Symantec found that 71% of UK organizations suffered a data breach in the last twelve months, while the average cost of that breach is 1.7 million pounds, up from 1.68 million pounds in 2009 MORE |
NASA DISCARDING COMPUTERS STILL CONTAINING SPACE SHUTTLE DATA: AUDITDecember 14, 2010
Personnel at NASA failed to remove data from obsolete computers before selling or discarding them, according to a NASA Office of Inspector General audit report released December 8 MORE |
PENTAGON PUSHING TO KEEP COMPUTER SECRETS SECRETDecember 14, 2010
The Pentagon is still tinkering with how far to clamp down on computer security as the steady drumbeat of WikiLeaks revelations reminds the top brass what's at stake MORE |
US HEALTHCARE DATA BREACHES COST $6 BILLION A YEAR: REPORTNovember 23, 2010
Data breaches at U.S. healthcare organizations cost providers more than $6 billion a year and despite this expensive and embarrassing revelation, the vast majority of hospitals and clinics still lack both the inclination and resources to make protecting patient data a priority MORE |
NEW ERA OF ONLINE TERRORISM IS HERE, SECURITY FIRM SAYSNovember 23, 2010
The prevailing wisdom among many cyber security experts and national security officials in Canada and the United States is that it's only a matter of time before a sophisticated cyber terror attack occurs MORE |
RECOVERING FROM A PRIVACY BREACHNovember 23, 2010
Stung by an audacious privacy breach two years ago, Toronto-based Mortgage Alliance Canada moved immediately to contain the damage and bolster the brokerage firm's security strategy - and has not relaxed its vigilance since MORE |
DETROIT HOSPITAL SECURITY BREACH INCLUDES 11 YEARS OF PATIENT RECORDSNovember 15, 2010
Henry Ford Health Systems has notified patients of a possible security breach after a laptop was stolen out of an unlocked medical urology office September 24th. Representatives with the hospital said although the password was protected there is a possibility some personal patient information could be at risk MORE |
HACKER SHUTS ROYAL NAVY WEBSITENovember 8, 2010
The website of Britain's Royal Navy was shut down Monday after it was compromised by hackers. A posting said the site was shut for "essential maintenance" and asked users to come back later MORE |
CYBER WARS: HOW TO AVOID COMPUTER NETWORK ATTACKSNovember 4, 2010
A cyber war using computer viruses as weapons, launched by a foreign state trying to shut down Britain's communication and power networks, has become a clear and present danger MORE |
GOOGLE ACCIDENTALLY MAPPED MUCH MORE THAN ADDRESSES, SAYS CANADA'S PRIVACY BOSSOctober 20, 2010
Thousands of Canadians likely had their privacy compromised when Google inadvertently collected personal information while putting together its Street View mapping service, Canada's privacy commissioner says MORE |
PRIVACY BREACH MUST BE TREATED AS SERIOUS CRIMEOctober 15, 2010
The biggest threat to the security of Canadians' personal information, especially their medical records, isn't from computer hackers, it would seem, but from those within the bureaucracy who access and share these records for personal or political purposes MORE |
MANAGING THE CLOUD'S SECURITY RISKSOctober 15, 2010
Cloud computing is all the rage these days. CIOs seem to be diving into cloud-based solutions with reckless abandon despite the fact that a mistake in planning or execution can have career-limiting effects. So, let's take a moment to balance the benefits against the potential security pitfalls that lie in the clouds MORE |
PREVENTING MEDICAL IDENTITY THEFTOctober 15, 2010
Medical identity theft is the fastest-growing form of ID theft in America today and has become a growing global problem, with The World Privacy Forum estimating the number of victims to be between 250,000 to 500,000 people each year MORE |
PRIVACY CZAR BLASTS FEDS ON BLACKBERRY USEOctober 15, 2010
Canada's privacy watchdog says some federal departments have no security procedures in place for recovering, wiping or encrypting lost and stolen BlackBerry smart phones MORE |
A DATA BREACH DOESN'T HAVE TO BE A DEATH SENTENCE FOR BUSINESSOctober 15, 2010
In today's high-tech era, data breaches have become increasingly more common, and increasingly costly, with the average breach costing more than $200 per compromised record, according to estimates by the Ponemon Institute MORE |
CANADIAN FEDERAL GOVERNMENT TO SPEND $90 MILLION OVER 5 YEARS TO PROTECT CYBERSPACEOctober 3, 2010
The federal government has launched its cyber-security strategy, which will cost $90 million over five years. Public Safety Minister Vic Toews and Natural Resources Minister Christian Paradis announced the launch at Ottawa Hydro as part of October's Cyber Security Awareness Month MORE |
65 PERCENT OF ADULTS VICTIMIZED BY CYBER CRIMESeptember 18, 2010
Cyber crime is a threat and a concern nationwide; so much so that 97 percent of adults expect to be victims at some point in their lives, according to a Wednesday study from Symantec MORE |
SCIENTISTS HACK INTO CARS' COMPUTERS - CONTROL BRAKES, ENGINESeptember 10, 2010
Hackers aren't taking over our cars just yet, but without tighter computer security they be able to before too long, research conducted by scientists at four universities indicates MORE |
ID BREACHES MORE COMMON THAN EVERSeptember 10, 2010
Our personal information, from addresses to Social Security numbers, is leaked - by hackers and by mistake - more often than we know. Records with private information such as drivers' licenses, financial documents and medical forms, either in paper format or electronically, are put at risk more than ever before, and often these risks are not disclosed to the public MORE |
PENTAGON TAKES AIM AT CHINA CYBER THREATSeptember 10, 2010
The U.S. for the first time is publicly warning about the Chinese military's use of civilian computer experts in clandestine cyber attacks aimed at American companies and government agencies MORE |
INTERNET IN THE CAR? THERE'S A VIRUS FOR THATSeptember 10, 2010
As our daily lives become increasingly linked to and controllable by the Internet, experts say we may encounter computer viruses attacking us in a host of new ways. With items not traditionally thought of as vulnerable, such as cars, home appliances, and electric meters going online, consumers are now opening themselves up significantly more channels for infection MORE |
DATA BREACHES BECOMING TOO COMMON FOR CONSUMERSAugust 30, 2010
For two years, an analyst for Countrywide Financial Group allegedly stole customers' personal financial information and sold batches of data for $500 each. Authorities say the analyst scored $50,000; the full cost to consumers - both in dollars lost through identity theft, and in time spent fixing botched credit reports - may never be known MORE |
NEW FROM APPLE: A PRIVACY NIGHTMARE?August 30, 2010
As consumers flock to do everything they can with their smartphones, the biggest threat to rapid adoption are privacy fears. Aware of those fears, major retailers are going out of their way to stress that they respect privacy MORE |
NEW THREAT: HACKERS LOOK TO TAKE OVER POWER PLANTSAugust 11, 2010
Cyber criminals have long tried, at times successfully, to break into vital networks and power systems. But last month, experts for the first time discovered a malicious computer code - called a worm - specifically created to take over systems that control the inner workings of industrial plants MORE |
U.S. MILITARY CYBERWAR: WHAT'S OFF-LIMITS?August 11, 2010
The United States should decide on rules for attacking other nations' networks in advance of an actual cyberwar, which could include an international agreement not to disable banks and electrical grids, the former head of the CIA and National Security Agency said Thursday MORE |
ALMOST ONE IN FOUR SECURITY BREACHES AFFECTED HEALTH CENTERS IN 2010: SURVEYAugust 11, 2010
Almost one out of four data security breaches affected health care centers in 2010, according to reports, though the numbers are likely somewhat padded by mandatory breach reporting data added this year. Still, the numbers are leading privacy rights advocates to push for tougher disclosure laws MORE |
MASSIVE CHEQUE FRAUD OPERATION RUN BY HACKERS REVEALED AT BLACK HAT CONFERENCEAugust 2, 2010
A three-month investigation by SecureWorks has uncovered an innovative cheque fraud operation that is estimated to have counterfeited $9 million in cheques in the past year MORE |
CYBERWARRIOR SHORTAGE THREATENS U.S. SECURITYJuly 21, 2010
There may be no country on the planet more vulnerable to a massive cyberattack than the United States, where financial, transportation, telecommunications and even military operations are now deeply dependent on data networking MORE |
CANADIAN LAW FIRM LAUNCHES PRIVACY CLASS ACTION AGAINST FACEBOOKJuly 13, 2010
The Canadian law firm 'Merchant Law Group' has launched a high profile class action suit against Facebook over the social network allegedly breaching the privacy of its users MORE |
TWITTER AND FTC SETTLE OVER PRIVACY BREACHESJuly 13, 2010
In the FTC's first case against a social networking site, Twitter agreed to establish a security program that will be audited by another company. According to an FTC news release issued last week, Twitter "will be barred for 20 years from misleading consumers about the extent to which it maintains and protects the security, privacy and confidentiality of nonpublic consumer information." MORE |
THE ONGOING WAR AGAINST CYBERCRIMEJuly 13, 2010
In March, a portable media device with personal data for more than 3 million people was stolen from Minnesota-based Educational Credit Management Corp. It is believed to be the largest breach of its kind MORE |
US PLANS CYBER SHIELD FOR UTILITIES, COMPANIESJuly 13, 2010
The US government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program MORE |
CYBER COMMAND CHIEF SAYS MILITARY COMPUTER NETWORKS ARE VULNERABLE TO ATTACKJune 26, 2010
The U.S. government is seeing "hints" that adversaries are targeting military networks for "remote" sabotage, the head of the Pentagon's recently launched Cyber Command said in his first public remarks since being confirmed last month MORE |
FCC SAYS MORE FOCUS NEEDED ON SECURITYJune 26, 2010
The Federal Communications Commission says it plans to boost inquiries into online security and privacy issues after recent security breaches involving Apple's iPad and Google's Street View cars that collected private data MORE |
FIVE WAYS TO KEEP ONLINE CRIMINALS AT BAYJune 7, 2010
"The Web opened up a lot more opportunities for attacking" computer users and making money, said Maxim Weinstein, executive director of StopBadware, a nonprofit consumer advocacy group that receives funding from Google, PayPal, Mozilla and others MORE |
SOCIAL MEDIA SITES BREACHING PRIVACY POLICIES: REPORTJune 7, 2010
Under scrutiny for lax - or even broken - privacy policies, it has been uncovered that several popular social networking sites have been sharing personal data with advertising companies, despite a policy that says information is not shared without consent MORE |
GOOGLE, MICROSOFT, YAHOO BREACH PRIVACY LAWS, EU GROUP SAYSJune 7, 2010
Google Inc., Microsoft Corp. and Yahoo! Inc. must limit the amount of time they keep Internet- search records to six months or justify the need for any longer storage periods, European Union officials probing possible breaches of EU data privacy laws said MORE |
POLL: CANADIAN BUSINESSES UNCONCERNED ABOUT PRIVACY BREACH RISKJune 7, 2010
Most Canadian companies aren't concerned about data breaches involving their customers' personal information - even though these same companies report they are collecting and holding more personal information than ever before, according to the results of a poll released on May 27 MORE |
IS THERE REALLY A CYBERWAR? TERM MIGHT BE MISUSEDMay 10, 2010
Is there really a "cyberwar" going on? Some officials and computer security companies say yes, arguing that armies of hackers are stealing online secrets and using the Internet to attack infrastructure such as power grids MORE |
AUSTRALIAN PRIVACY COMMISSIONER LAUNCHES PRIVACY GUIDEMay 10, 2010
The Australian Privacy Commissioner has launched new information to guide businesses on how to handle personal information. Privacy Commissioner, Karen Curtis, described the Privacy Impact Assessment Guide (PIA Guide) as a tool for companies to use when working on projects that use the personal information of consumers MORE |
FACEBOOK FLAW EXPOSES PRIVATE INFORMATIONMay 10, 2010
A major security flaw in Facebook has allowed users to see other people's personal information, and once again opened the social networking site to accusations of not securing user data effectively MORE |
HOW SOME EX-EMPLOYEES TURN TO CYBERCRIMEApril 15, 2010
When a slumping economy and historically high unemployment rates dropped the axe on the country's workforce and left the survivors wondering if - or when - they'd be next, law enforcers and security experts braced themselves for what they considered would be an almost inevitable rise in data breaches and high-tech crimes. And they were right MORE |
THE AGE OF DATA PRIVACYApril 15, 2010
The financial consequences of inadequate data privacy and protection continue to grow. According to Ponemon Institute research, the average cost of a customer data breach grew from $4.5 million in 2005 to $6.7 million in 2008. In 2008 alone, the total cost of data privacy breaches in U.S. corporations was $721 million MORE |
PLEASE DO NOT CHANGE YOUR PASSWORDApril 15, 2010
Now, a study has concluded what lots of us have long suspected: Many of these irritating security measures are a waste of time. The study, by a top researcher at Microsoft, found that instructions intended to spare us from costly computer attacks often exact a much steeper price in the form of user effort and time expended MORE |
WHAT TO TELL MOM AND DAD ABOUT COMPUTER SECURITYApril 14, 2010
Ever get that tech support call from your parents saying, "My computer is slow all of a sudden" or "I have all sorts of weird things popping up on my screen"? You then troubleshoot the problems only to find out that malware, spyware, viruses or other such nastiness is the culprit. If you've been there, done that here are five basic security tips to provide to your parents that, if followed, are sure to credit you back hours of your time MORE |
RESEARCHERS TRACE DATA THEFT TO INTRUDERS IN CHINAApril 14, 2010
Turning the tables on a China-based computer espionage gang, Canadian and United States computer security researchers have monitored a spying operation for the past eight months, observing while the intruders pilfered classified and restricted documents from the highest levels of the Indian Defense Ministry MORE |
HOW PRIVACY VANISHES ONLINEMarch 26, 2010
If a stranger came up to you on the street, would you give him your name, Social Security number and e-mail address? Probably not. Yet people often dole out all kinds of personal information on the Internet that allows such identifying data to be deduced MORE |
INSIDE A GLOBAL CYBERCRIME RINGMarch 26, 2010
Hundreds of computer geeks, most of them students putting themselves through college, crammed into three floors of an office building in an industrial section of Ukraine's capital Kiev, churning out code at a frenzied pace. They were creating some of the world's most pernicious, and profitable, computer viruses MORE |
SECURITY BREACH NOTICES FOR CANADIAN DATAMarch 26, 2010
More recently, Special Commissions at the federal level and in the provinces of Alberta and British Columbia have recommended amending privacy legislation to mandate notification of material security breaches. Alberta is the first to act on this recommendation MORE |
USER IS THE WEAKEST LINK OF COMPUTER SECURITYMarch 26, 2010
The issue of social engineering is fast becoming the topic of the day. The fact that we humans are social creatures predisposes us to become the weakest link in the proverbial security chain. The knee-jerk reaction to what we are up against seems to be to push more education and awareness about these types of threats MORE |
MOST PEOPLE DON'T UNDERSTAND CYBER THREATS, SAYS FORMER HOMELAND SECURITY CHIEFMarch 12, 2010
Michael Chertoff, who ran the Department of Homeland Security from 2005 to 2009, says there's a reason that computer security isn't up to the threat posed by cyber criminals: Doing it right is too complicated for most people MORE |
GOOGLE PRIVACY EXECS CONVICTED - A TROUBLING PRECEDENTMarch 12, 2010
Italian courts set a troubling precedent last week by convicting three Google executives in a criminal case. The case was brought by prosecutors in connection with a clip showing the bullying of a teenager with Down's syndrome. The clip was uploaded to Google Video in 2006 by the school children responsible for the bullying MORE |
SECURITY BREACH NOTIFICATION LAWS REINFORCE NEED FOR CYBER INSURANCEMarch 12, 2010
According to Emily Freeman, executive director and partner of Lockton International's Technology, Media and Telecommunications Practice, the average cost of a security breach for a company is $15 per person. For a business with millions of customers, that can really add up MORE |
PODCASTS SOUND THE RIGHT NOTEMarch 2, 2010
While Twitter, Facebook and YouTube grab the headlines, businesses from across Canada are tapping into one technology that deserves more media attention -- podcasts. This cost-effective and convenient form of social media is being used more and more by business people as a learning tool and to deliver their own messages MORE |
COST OF A DATA BREACHFebruary 15, 2010
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses: The current cost of a data breach - and how it's risen since 2009; Data breach trends across industry; What organizations should do to respond to or prevent breaches MORE |
IS THE CHINESE GOVERNMENT REALLY BEHIND CYBERATTACKS?February 15, 2010
For those of us inside the computer security industry, there's nothing new about suspecting the Chinese government of malicious hacking. What's missing in this case, however, is evidence, and until that proof materializes, I refuse to point the finger at Beijing MORE |
TOP TEN DATA BREACHES AND BLUNDERS OF 2009February 15, 2010
From stolen devices and phishing attacks to buggy apps and human blunders, 2009 was another banner year for data breaches. According to the Privacy Rights Clearinghouse, over 345 million records containing sensitive data have been involved in incidents within the United States since January 2005. But last year, one single breach compromised 130 million records. In an effort to do better this year, let's recount some of the worst data breaches reported in 2009 MORE |
STUDY FINDS GROWING FEAR OF CYBERATTACKSFebruary 2, 2010
A survey of 600 computing and computer-security executives in 14 countries suggests that attacks on the Internet pose a growing threat to the energy and communication systems that underlie modern society. The findings echoed alarms raised this month by Google after it experienced a wave of cyberattacks MORE |
UTILITIES, REFINERIES AND BANKS ARE VICTIMS OF CYBER ATTACKS, REPORT SAYSFebruary 2, 2010
Companies that run key public infrastructure assets like electric utilities, oil refineries and banks are regularly victims of the kind of cyber attacks that recently penetrated Google Inc., according to a new report by a former top U.S. homeland security official MORE |
STUDY: OF ALL BREACHES, THOSE CAUSED BY HACKING ARE THE COSTLIESTFebruary 2, 2010
The cost of data breaches rose slightly last year, but breaches resulting from computer hacking incurred by far the highest losses, according to a new report from privacy and data-security research firm Ponemon Institute LLC MORE |
DATA BREACHES COST MORE IF ENTERPRISES MOVE TOO FASTFebruary 2, 2010
In its fifth annual study on data breaches, the Ponemon Institute discovered that about 36 percent of participants notified their breach victims within one month, but ended up paying $219 per compromised record as opposed to the $196 paid by others. According to the study, a reason for this may be that companies moved too quickly through the process of detection, notification and related activities, and made costly mistakes along the way MORE |
NEW YORK ANNOUNCES DATA PRIVACY DAY TO PROTECT RESIDENTS FROM IDENTITY THEFTFebruary 2, 2010
More than 1.1 million records of New York State residents were impacted by over 400 data breaches in 2009, highlighting the need for vigilance among all entities that handle personal identifiable information in our State," said Governor Paterson. "We are committed to providing important information and resources to help businesses avoid data breaches, and assisting thousands of consumers who have fallen victim to identity theft MORE |
IT EXPERT ALARMED BY GOVERNMENTS' BROWSER WARNINGSJanuary 18, 2010
A Toronto Internet security expert is surprised and disturbed that two European governments are warning people not to use Internet Explorer because of security risks. France and Germany have urged Internet users to avoid Microsoft's browsers IE 6, 7 and 8 because of a weakness that allows hackers to infect the system MORE |
THE IMMINENT ARRIVAL OF CANADIAN BREACH NOTIFICATION LEGISLATION A WELCOME CHANGE FOR CONSUMERSJanuary 11, 2010
Following recent public breaches in the private and public sectors in Canada, Alberta's announcement of the arrival of a breach notification law is a welcome one MORE |
COMPUTER SECURITY FIRM LISTS CYBER THREATS OF 2010January 11, 2010
A computer security firm has advised PC owners to keep their computer safe from new security threats in the new year. The experts revealed that the way people use the Internet and their computers has evolved significantly and so have the cyber criminals. They have changed their tactics accordingly MORE |
BEWARE WHO FIXES THAT BROKEN LAPTOPJanuary 11, 2010
Data-recovery services are responsible for a surprisingly large chunk of privacy breach incidents, in which companies lose control of personal data pertaining to employees or customers, according to a study released Tuesday by the privacy-focused group the Ponemon Institute MORE |
FLASH DRIVE FIRMS WARN OF SECURITY FLAWJanuary 11, 2010
SanDisk Corp. and Verbatim Corp. have joined Kingston Technology Inc. in warning customers about a potential security threat posed by a flaw in the hardware-based AES 256-bit encryption on their USB flash drives. The hole could allow unauthorized access to encrypted data on a USB flash drive by circumventing the password authorization software on a host computer MORE |
ADDITIONAL NEWS ARTICLES IN 2009 ARCHIVE |
E-Commerce Alerts are issued by Bennett Gold LLP, Chartered Accountants as situations develop. Bookmark this site and check back often. |