31st Jan 2015

0 Comments

Electronic Court Case Filing Technology

As we continue to move into the digital era, even legal tasks, such as court case filing, can be automated and secured by executing them electronically and remotely. E-Filing, Inc. offers an electronic court case…

Read More

30th Jan 2015

0 Comments

What is an SSL certificate?

An SSL certificate, otherwise known as Secure Sockets Layer, is an Internet security technology that establishes an encrypted connection between a server and a client (e.g., a web server and a browser). A website that…

Read More

29th Jan 2015

0 Comments

Throwback Thursday: Robo Signing Scandals

What is robosigning? Robosigning happens when a person, usually a bank employee, signs thick stacks of affidavits that demonstrate that the homeowner has defaulted on a mortgage, transferring ownership of the mortgage to the lender….

Read More

28th Jan 2015

0 Comments

Topface – Dating Website – Breached

Topface, a Russian-based dating website, has recently been hacked by a hacker named “Mastermind”. The hacker claims to have compromised more than 20 million consumer credentials, but Topface states that there is no info indicating…

Read More

27th Jan 2015

0 Comments

What’s the Difference Between Electronic and Digital Signatures?

A basic electronic signature is any electronic means linking you to a written message or document. This could include PIN numbers (ATM), fingerprints, copy-and-paste signatures, etc. Although basic electronic signatures embrace the concept of convenience…

Read More

27th Jan 2015

0 Comments

Malaysia Airlines Website Breached

On January 26, the Malaysia Airlines websites suffered a data breach and exposed customer data into the online world. According to evidence, a hacking group known as Lizard Squad carried out the attack and even…

Read More

23rd Jan 2015

0 Comments

ESignIT

ESignIT, a digital certificate authority offering digital signature solutions, has recently restructured their company in order to update its components for the modern age and clean out any confusion regarding the company. ESignIT.org will soon…

Read More

23rd Jan 2015

0 Comments

American Airlines Find a Bullseye in the Heart of their Organization

Recently, American Airlines reported that usernames and passwords obtained from a third-party source led to the exposure of a limited number of frequent flier accounts for AAdvantage. However, out of 70 million total frequent flier…

Read More

22nd Jan 2015

0 Comments

San Francisco County Superior Court Launches E-Filing with Image-X

In December, the San Francisco County Superior Court launched its e-filing portal in which clients can electronically and remotely file their court cases. In addition, the e-filing server will soon be digital certificate encrypted as…

Read More

22nd Jan 2015

0 Comments

HITRUST Addresses Medical Device Security Issues

Due to the concerns revolving around the cybersecurity of medical devices, HITRUST, the Health Information Trust Alliance, has recently launched a campaign to improve the security and trust of health information technology. Their main goal…

Read More

21st Jan 2015

0 Comments

US and UK Respond to Online Attacks Following Paris Massacre

Due to the online attacks following the Paris Massacre, US and UK have planned to hold “cyber war games” in order to improve the cooperation between both nations’ law enforcement and information intelligence institutions. David…

Read More

21st Jan 2015

0 Comments

NSA Infiltrates North Korea

Due to the recent hack on Sony and the accusations made against North Korea, the NSA hacked North Korean hackers by infecting their PCs with malware. By hacking their PCs, the NSA was striving to…

Read More

21st Jan 2015

0 Comments

UK Shoe Retailer Suffers Security Breach

The UK Shoe Retailer, Office, has been ordered by the UK Information Commissioner’s Office to address data security issues after a recent breach in May. The security breach led to the exposure of more than…

Read More

16th Jan 2015

0 Comments

Android: More Risk Than Benefits?

Currently, information security experts are pleading Google to change their mind in regards to updating Android 4.3 “Jelly Bean” with a critical component revolving around cybersecurity. Without this critical component, 83% of all Android smartphones…

Read More

15th Jan 2015

0 Comments

CISOs Preparing for the Cyber Disasters to Come

During this new year of 2015, cybercrime is predicted to reach disastrous proportions. For example, India is looking at a 100% rise in cybercrime rate this year compared to the year of 2014. Security leaders…

Read More

14th Jan 2015

0 Comments

Bitstamp Attempting Recovery from Security Breach

European Bitcoin exchange Bitstamp made its comeback from suffering a data breach in which some of its operational wallets became compromised on Januaury 4. The breach resulted in a loss of approximately 5 million dollars due to…

Read More

13th Jan 2015

0 Comments

Sony Hackers Possibly Russian?

Though FBI Director James Comey believed that the Sony hacking incident was orchestrated by the North Koreans, linguistics expert Shlomo Engelson Argamon found that the hackers’ messages seem to be written by native Russians. Although…

Read More

1st Jan 2015

0 Comments

Top 10 Healthcare Data Breaches for 2014

2014 has been a difficult year for healthcare organizations.  Security measures for 2015 need to improve. Aventura Hospital and Medical Center employee accessed 82,000 patients’ information, but no financial or health records. Community Health was attacked…

Read More