FTC Settles Complaint Against Venmo

On February 27, the Federal Trade Commission (FTC) reached a settlement with Paypal, Inc. relating to the privacy and security practices of Venmo, Paypal’s peer-to-peer payment service. The FTC alleged that Venmo failed to adequately disclose to its users that transfers of funds from their Venmo balances to external bank accounts were subject to review, […]

An Agnostic View on Cybersecurity

The Federal Trade Commission (FTC) has taken an agnostic view towards cyber security as of late. The FTC’s chairwoman Edith Ramirez has called for a “culture of security” whereby she encourages companies and start-ups to make the appropriate investment for security when they first conceive a product. However, there is a distinct disconnect between the […]

The Importance of Employee Training: Hands-On Experience vs. Advanced Skills

Advanced skills are not necessary to penetrate totally woeful security arrangements. Many government contractors, military and intelligence agencies and other companies are not eyeing people with cybersecurity degrees. Rather, hands-on work experience is becoming increasingly valuable within the computer profession. They first identify people with natural ability and related technical skills, and then introduce them […]

Wi-Fi Routers: A New Avenue for Hackers To Attack

Wi-Fi routers appear to be another avenue for hackers to strike. As Sequel has said before, often times it is the office hardware people overlook that can pose real danger to a company. Computerworld has reported the popular Belkin N600 DB router has several vulnerabilities unauthenticated hackers could exploit. The CERT Coordination Center at Carnegie […]

What Are the Federal Government’s Standards for Cyber Security?

The U.S. Federal Trade Commission (FTC) can now take action against companies failing to protect customer data, according to a recent decision by the U.S. Court of Appeals for the Third Circuit. The important point to note about this headline is that the federal government has not set actual standards for cyber security. Therefore, it […]