Articles Posted in Cybersecurity

Updated:

California Privacy Laws

In recent years, online transactions, such as activities on social media networks, have exposed personal privacy to greater risks. With so much personal information available over the Internet, it is increasingly important to be aware of the applicable laws, so that your privacy is better enforced and protected. The risks…

Updated:

Target’s Security Breach and Identity Theft Threats

On December 19, 2013, Target issued a statement confirming a major security breach. According to the statement, approximately 40 million customers were at risk for identity theft because of the breach. Hackers had gained access to customer information, including their names, credit card numbers, debit card numbers, card expiration dates,…

Updated:

Senior Citizens and Cyber Fraud

Cyber criminals are very skilled in singling out vulnerable targets for online schemes. For instance, senior citizens are ideal candidates for cyber fraud or Internet fraud because they are more likely to have large amounts of money saved up, and they tend to have better credit, making schemes more profitable…

Updated:

Protecting Trade Secrets in Cyberspace

A business’s trade secrets are an essential component of its foundation, growth, and development. A trade secret is any sort of confidential and proprietary information that a company seeks to protect from unauthorized access.  For example, a trade secret, includes a formula, pattern, compilation, program, device, method, technique, or process…

Updated:

International Electronic Privacy

In recent times, the threat of privacy invasions has spread far beyond domestic governmental agencies, but to also include foreign and international governments. Do you travel outside of the United States? Do you travel with electronic devices, such as a cellphone or laptop? Do these devices hold any sensitive information,…

Updated:

Sextortion Investigations

On August 14, 2013, the FBI confirmed its investigation regarding a sextortion case involving several women, including the recently-crowned Miss Teen USA, Cassidy Wolf. While the FBI did not release any information regarding the investigation or potential suspects, they did say the investigation has been going on for several months.…

Updated:

Cyber Threats: Phishing and Spoofing

As cyberspace becomes a larger part of everyday life, the threat of cybercrimes becomes more prevalent. Consumers conduct all sorts of business over the Internet, which involves storing and transferring personal information on various online sites. Accordingly, the wealth of personal information available over the Internet has drawn in a…

Updated:

Defending Against the Growing Threat of Identity Theft

Few crimes affect as broad a scope of people as identity theft. With social networks, credit cards, personal information, and contact information so interconnected, perpetrators can trespass into a person’s life by breaking past a single password-protected account. Accordingly, the Los Angeles County District Attorney’s Office has created a special…

Updated:

IMAGiNE Group Faces Counts of Criminal Copyright Infringement

After an investigation by U.S. Immigration Customs Enforcement’s Homeland Security Investigations unit, U.S. District Judge Arenda L. Wright found members of IMAGiNE Group guilty of criminal copyright infringement. The court found IMAGiNE Group, an Internet piracy circle, guilty of perpetuating an effort to release movies available only in movie theaters.…

Updated:

Threat of International Cyber Attacks

The news outlets have been reporting that the Chinese have allegedly been hacking into American infrastructures. Assuming this report is accurate, the United States is not equipped to handle the consequences of such an attack. These hackers would possess the power to disable the critical infrastructure in this country, eliminating…

Contact Us