The Latest in Tech Today
Audit Logs May Help You Make Your Case — If You Have Them
Audit Logs May Help You Make Your Case — If You Have Them Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...
Real or Fake — Can You Tell Perfect “Deep Fakes” in the Next Year
Real or Fake — Can You Tell Perfect “Deep Fakes” in the Next YearDeepFakes can appear as Videos or Images, and it is getting harder to tell if they are real. Gone are the days of tabloids who put a famous face on a not so great body and it was pretty easy to know that...
Saudi IT Providers Hit in Cyber Espionage Operation
Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers' ultimate...
Privacy Comes To Largest Installed Browser Base.
Privacy Comes To Largest Installed Browser Base. Mozilla is enhancing the privacy of its US-based Firefox browser applications with a new VPN privacy extension, this week. After downloading, they must sign in to their Firefox account and then click on the extension's...
Warning About Security of Cryptocurrency
Warning About Security of Cryptocurrency If you have listened to me for a while, you know how I feel about Cryptocurrencies, and it looks like I was right all along. It is fraught with fraud that prays on peoples hopes and dreams. The criminal activity of ransomware...
Chinese Front Organizations on Our Universities Used For Nefarious Purposes
Chinese Front Organizations on Our Universities Used For Nefarious Purposes It seems as though there are countries that are intent on stealing our intellectual property and technology through fraud, and China appears to be one of the biggest perpetrators. Just this...
You Can Buy Anything In This World For Money
You Can Buy Anything In This World For Money You can buy anything in this world for money — nowhere is this statement truer than on the Dark Web. No matter what a cybercriminal is looking for with money someone in the dark web supply chain which is willing to provide...
Perils of Public WiFi and How To Protecting Your Information
Perils of Public WiFi and How To Protecting Your Information With the abundance of available public WiFi networks that are prompting us to connect whenever we sit down in a public area. Who pays for those WiFi routers, is it a profit point for the business by selling...
Major Cell Carrier Program Protects Customers from SimSwapping
Major Cell Carrier Program Protects Customers from SimSwapping T-Mobile is taking action against the social engineering attack known as Sim Swapping. Using a non-advertised and rather private feature knowns as "NOPORT" to prevent the tricking of their customer service...
Enjoying Some Anonymity Maybe Not For Long
Enjoying Some Anonymity Maybe Not For LongWorldwide in research labs engineers are working on some scarily intrusive surveillance technology tools. But what happens once these technologies have completed the design and testing process — they must be sold and used....
HR The Gateway To Cybercrime
HR The Gateway To Cybercrime Today's cybercriminals are continually developing new and sophisticated techniques with which to gain access to their victim's internet technology systems. Currently, over 90% of all cybercrime involves a phishing email. We all have...
Algorithms Should be Fair — But they are not.
Algorithms Should be Fair -- But they are not.Kentucky lawmakers thought requiring that judges consult an algorithm when deciding whether to hold a defendant in jail before trial would make the state’s justice system cheaper and fairer by setting more people free....
Successful Cybercriminals Require Your Help
Successful Cybercriminals Require Your HelpMost cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other...
Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks
Unpatched Firewalls leave US Power Grid Vulnerable to CyberattacksA cyber-security incident that impacted a US power grid entity earlier this year was not as dangerous as initially thought, the North American Electric Reliability Corporation (NERC) said last week. In...
Tesla Autopilot Feature Raises Issues
Tesla Autopilot Feature Raises Issues Yet another Tesla driver has apparently fallen asleep behind the wheel while his car cruised down the freeway. The latest video comes from the Boston area, where a local man caught a video of a Tesla driver and his...
HIPAA Can’t Protect Privacy In Medical Apps
HIPAA Can't Protect Privacy In Medical Apps Americans may soon be able to get their medical records through smartphone apps as easily as they order takeout food from Seamless or catch a ride from Lyft. But prominent medical organizations are warning that...
No More Hiding -Google’s Tactics Under Scrutiny
No More Hiding -Google's Tactics Under ScrutinyOn Monday, 50 attorneys general from US states and territories signed onto an antitrust investigation into Google, placing even more pressure on the major tech firm that is already facing intense scrutiny over its market...
Security Demands Up With 5G
Security Demands Up With 5GZhou Hongyi, co-founder of Chinese internet security provider Qihoo 360 Technology, expects the rollout of 5G mobile services and expansion of the industrial internet to open up more opportunities for the company in the world’s second...
Are you ready? — Apple’s Product Announcement
Are you ready? -- Apple's Product AnnouncementApple’s big hardware event for 2019 has wrapped, and, as expected, it brought a bounty of exciting announcements. Of course, the iPhone 11 happened — and, yes, a version is really called the iPhone 11 Pro Max — but there...
Do You Own A Car That Spies On You?
Do You Own A Car That Spies On You?The secret sensors, fitted to all new and used motors sold by the firm’s dealers, pinpoint the vehicle’s exact location. The firm sold more than 170,000 new cars in Britain alone last year. Mercedes will not say how long it has used...
Companies Sharing Your Data with Their Third Party Vendors
Companies Sharing Your Data with Their Third-Party VendorsIt seems that every day there's another news headline about how companies are using consumer data. Facebook was in the news again recently when the FTC slapped it with a $5 billion fine based on investigations...
Security Protections Badly Needed On Routers
Security Protections Badly Needed On RoutersNew testing by Consumer Reports shows important differences in how routers from popular brands handle digital security. Some of the 29 routers we examined this spring and summer build in important safeguards, such as...
Has New Storage Tech Made It Impossible To Securely Erase Old Hard Disks
Has New Storage Tech Made It Impossible To Securely Erase Old Hard DisksIn the olden days, when you wanted to replace your hard drive with a bigger one, you’d run a “secure erase” on it to completely remove any personal data. This would write zeros to the entire disk,...
Why would a Salesman Dis the Product he Sells
Why would a Salesman Dis the Product he SellsCurrent mass market security solutions can’t keep up with all the cybercrime exploits. It turns out that some of their salesman now know the truth about what they are representing.
Prices for Zero Day Attacks – Which commands higher price Apple or Android?
Prices for Zero-Day Attacks - Which commands higher price Apple or Android?For the first time ever, the security exploits broker Zerodium is paying a higher price for zero-day attacks that target Android than it pays for comparable attacks targeting iOS. An updated...
Cloud Services Have a Dark Side When It Comes To Security
Cloud Services Have a Dark Side When It Comes To SecurityMore than half of firms running multicloud environments have been hit with a data breach in the past year, compared with 24% of hybrid cloud organizations and 24% of single-cloud users. To gain a better...
Can your CEO’s Voice be Faked? How would you know?
Can your CEO’s Voice be Faked? How would you know?Fraudsters are constantly looking for new ways to scam their victims. One unique case gives the security industry a glimpse of what they could do with artificial intelligence (AI) and voice recording. As part of an...
Security Alerts — How to tell Which are Important.
Security Alerts — How to tell Which are Important. Alert fatigue is becoming a universal problem, and it's mainly due to a reactionary cybersecurity marketplace where security operations teams are challenged with transforming their approaches to keep pace with...
Inflammation Problem Try Intermittent Fasting
Inflammation Problem Try Intermittent Fasting Fasting could provide "enormous potential" in managing or preventing inflammation which is thought to contribute to type 2 diabetes, US researchers have said. A team from the Mount Sinai hospital report that...
Paying Ransom’s Fuels Rise in Ransomware
Paying Ransom’s Fuels Rise in Ransomware On June 24, the mayor and council of Lake City, Florida, gathered in an emergency session to decide how to resolve a ransomware attack that had locked the city's computer files for the preceding fortnight. Following the...