Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
26 Results for 'Hack'
Blog

By Stephen Demone

November 30, 2017

What if you got hacked, were able to retrieve the data from the hackers and didn’t tell anyone about it? Would all of your problems go away?  
Blog

By Entrust Datacard

July 31, 2013

For quite awhile now, we have been following several stories related to the hacking of Twitter accounts. And this week, the newsfeed is inundated with information that the hackers have indeed struck again. And yet again, it’s the Syrian Electronic Army causing social media mischief.
Blog

By Entrust Datacard

April 23, 2013

Wow. All I can say is wow. The Associated Press had their Twitter account (@AP) hacked.
Blog

By Entrust Datacard

February 23, 2016

Once again, hackers have reminded Uncle Sam that he is not impervious to cyberattacks. This time the targets were none other than the Department of Homeland Security, and the FBI. 
Blog

By Entrust Datacard

September 10, 2014

We don't live in a world where we can assume that the information we store online is safe, especially without stronger safeguards. Indeed, as many experts point out, it's not much of a stretch to label hackers neo-terrorists. With the clearly elevated degree of threat posed by cybercriminals, the question becomes this: Is anything hack-proof? The Answer? No That's the simple answer, according to TIME. Entrust Datacard provides context and background on this growing concern. 
Blog

By Entrust Datacard

December 08, 2014

Learn about Jeremy Hammond, a prolific hacker who leads a life of "Hactivism" in order to help others understand how they can protect themselves from the dangers of online hackers.
Blog

By Entrust Datacard

February 09, 2015

When we talk about hacking these days, we're not talking about something that's confined to computers and mobile devices only. Sure, the majority of cybercrime that's carried out currently revolves around these mechanisms, but with the global push toward the Internet of Things, the sphere of items and objects that could become vulnerable to hacks is growing broader.
Blog

By Ranjeet Khanna

October 18, 2017

If not properly secured, connected cars threaten to expose sensitive consumer information. With data being passed between so many different connected channels, it’s easier than ever for hackers to get their hands on personally identifiable information. It is very difficult to select a public key or a set of public keys that can be trusted for a long period of time. If the wrong public key is used, a website can be bricked until the server header expires. The wrong key could be provided accidentally or by an attacker. As in many cases, a site can be bricked where the administrator knows nothing about HPKP, or it’s been redirected by an attack.
Blog

By Entrust Datacard

June 09, 2016

According to The American Bar Association, Entrust Datacard reports that 25 percent of law firms with 100 or more employees have experienced cybercrime. As the size of the law firm increased, it would seem that the likelihood of a hack is greater.
Blog

By Entrust Datacard

January 13, 2016

In early 2015, the Washington Post quite accurately referred to 2015 as the "year of the health care hack," and forecast that the situation would continue to escalate. While the data breaches that followed did not quite match the scale of the infamous Anthem and Premera attacks, health care, as predicted, was hit hard. 
Page 1 of 3