California has a history of creating legislation that creates a ripple effect that affects consumers in other states. While the laws only affect California, they often push companies into adopting the rules broadly – for example, California’s strict auto emissions standards have been adopted in 16 other states since 2004. “What California does definitely impacts the national conversation,” says state Senator Scott Wiener. As the home of some of the biggest names in technology, it’s no surprise that California’s legislators are especially concerned about cybersecurity. In 2018 alone, California has passed several laws that they hope will inspire other states – and ultimately, Congress – to passing cybersecurity laws that better address the issues of our time. However, these laws have also attracted criticism from tech companies, cybersecurity experts, and the Federal Government. These laws may come to affect you, which is why we’ve created this guide.
Tag: Internet of Things (IoT)
The internet is everywhere, thanks to the Internet of Things (IoT). The term “Internet of Things” applies to any nonstandard computing device that connects to wifi and can transmit data. Well-known examples of IoT devices include smart speakers like Amazon Alexa or Google Home, smartwatches like the Apple Watch, internet-connected baby monitors, video doorbells, and even toys.
However, the convenience these devices offer comes with a price: insufficient security measures, vulnerabilities, and the risk that your data will be compromised. But don’t be alarmed if there’s already an IoT device in your home – we have some tips on how to best use them safely.
If your New Year’s resolution is to protect yourself from cyberattacks, you’re in luck! This week on Decoding Security, security analysts Jessica Ortega and Ramuel Gall share their predictions for the top cybercrime trends in 2018. Our hosts also identify ways you can arm yourself against these ever-evolving threats. We don’t want to give away their predictions, but we’ll give you a hint: if your holiday gifts included a digital assistant like Amazon Alexa or Google Home, be sure to tune in!
We’ll also catch you up on the latest cybersecurity news, including the 25 Worst Passwords of 2017 and a leaky server that exposed 300,000 email addresses and login credentials from Ancestry.com.
Happy New Year from SiteLock and Decoding Security! Our New Year’s resolution is to continue to bring you a fun and informative podcast, so make sure you keep up by subscribing on YouTube, iTunes, or Google Play!
If a compromised credit card isn’t on your wish list for Black Friday and Cyber Monday, then be sure to check out the latest episode of Decoding Security! Your hosts, SiteLock Security Analysts Jessica Ortega and Ramuel Gall, have some simple tips that all holiday shoppers can follow to keep your information safe.
Internet-connected devices can make our lives easier, from home assistants like Amazon Echo, to interactive toys like CloudPets. However, they’re also inherently insecure and easily hacked, a factor many overlook in favor of convenience. In our latest Decoding Security podcast, Website Security Research Analysts Jessica Ortega and Michael Veenstra discuss the risks of using internet-connected devices in our everyday lives, and the costs of security versus convenience.
A series of internal CIA documents released Tuesday by WikiLeaks serve as a reminder that any computer, smartphone or other device connected to the internet is vulnerable to compromise.
The 8,761 documents detail a CIA hacking program with 5,000 registered users that produced more than a thousand hacking systems, Trojans, viruses, and other “weaponized” malware. The scale of the program was so massive that by 2016, its hackers had utilized more code than what is currently used to run Facebook.
It’s Halloween and zombies are afoot. They’re not coming through the windows or wading through the streets, though. The massive zombie horde approaches through the spider-filled web that has been spun to cover the entire world … the worldwide web, that is. However, it isn’t an undead army we have to worry about, although one could not say what is yet to come this All Hallows’ Eve, it’s botnets of zombie machines that have taken aim to disrupt services.
If you’ve ever visited Phoenix during the summer, you know it’s hot. The kind of hot that can run your electricity bill through the roof if you like to keep the inside of your home habitable. My role at SiteLock takes me out of town on a regular basis, which means I don’t spend a lot of time at home and don’t necessarily need to cool it while I’m away. Why not give the air conditioner a rest, go a little greener, and save some money in the meantime? For many, that’s easier said than done. We have a tendency to forget to change the thermostat before leaving and end up with a stomach-turning electricity bill at the end of the month. Now, you could consider using a programmable thermostat, but if your schedule isn’t exactly static, it might not be the perfect fit. Most of the time I don’t even think about the thermostat until after I’ve landed in another city. It sure would be nice if I could set my thermostat remotely. I’ve decided it might be time to consider a letting the Internet of Things (IoT) into my home.
There’s no bigger buzzword in the security world now than the ‘Internet of Things.’ The Internet of Things, or IoT, is the connectedness of everyday devices and sensors to allow the quantification and control of systems. Video doorbells alert wayward homeowners of visitors. Bluetooth fobs connect car keys to smartphones. Thermostats track heating and cooling preferences to select a tailored temperature for a homeowner. Unfortunately, the design complexity of a previously unconnected device now given intelligence and network access can lead to unforeseen issues and real-world consequences. Therefore, IoT security must be a consideration and, ideally, a foundational characteristic in their design.
One year ago in February, the major eBay hack was in progress, eventually resulting in over 233 million passwords being stolen. Fast forward to 2015, and we’ve had several trending cyber security issues appear in just these first few weeks.
Below are 7 trending cyber security stories that you should read for February 2015.