The Latest in Tech Today

Security First, Apple Stands Ground on iPhone Encryption

Security First, Apple Stands Ground on iPhone EncryptionThe Apple iPhone platform is based on security first. It is designed to be secure and private.  To do that they use a proprietary encryption system. While there have been private companies who have tried to break...

read more
No Security for Windows 7 After Today

No Security for Windows 7 After Today

No Security for Windows 7 After TodayAre you using Windows 7?  Did you know some of the largest firms in the country (even large financial institutions) are still using it?  Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...

read more

Zero-Day Browser Vulnerabilities

Zero-Day Browser Vulnerabilities“This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...

read more

A Lesson to Learn – If it is Connected It can Be Hacked

A Lesson to Learn - If it is Connected It can Be HackedI remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product was...

read more

Routers and Firewalls with Broadcom Chipsets Are Vulnerable

Routers and Firewalls with Broadcom Chipsets Are VulnerableHave you heard of the router/firewall critical vulnerability called Cable Haunt? Well, for 200 million worldwide users, this could soon be a nightmare come true. Cable Haunt allows a hacker to compromise the...

read more

Social Engineering Comes to the Forefront of Attacks

Social Engineering Comes to the Forefront of AttacksWe depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...

read more

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My!Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time - patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network system...

read more

Cyber War isn’t Coming It is already Here!

Cyber War isn’t Coming It is already Here!Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...

read more
How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...

read more

Zeroing In On our Industrial Control Systems

Zeroing In On our Industrial Control Systems The country of Iran has been recruiting and training an army of cyberhackers and developing digital tools that can disruptively sabatoge entire computer networks.  Now they are focusing their efforts on SCADA systems often...

read more

Metrics Can Not Adequately Describe The Pain of Cybercrime

Metrics Can Not Adequately Describe The Pain of Cybercrime How can you measure the effect of a cybersecurity incident on your company? Knowing the number of records involved and the costs incurred by the event, but it can not give you a complete picture because there...

read more

Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit TechnologyCybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older vulnerable...

read more

Cloud Migration Considerations to Take into Account

Cloud Migration Considerations to Take into Account ​Deciding to move to business technology services to "the Cloud" is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest level of the...

read more

Businesses In For Rude Awakening as CCPA Takes Full Effect

Businesses In For Rude Awakening as CCPA Takes Full EffectWhat use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored?  California's Consumer...

read more

Intermittent Fasting and its Perks

Intermittent Fasting and its PerksFat loss is an excellent reason to fast, but it isn't the only benefit of fasting. Intermittent fasting makes your day simpler. Intermittent fasting helps you live longer. Intermittent fasting may reduce cancer risks. Intermittent...

read more

Pesky Apps That You Need To Delete ASAP

Pesky Apps That You Need To Delete ASAPNot all Apps are Good Apps...   Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people's lives are so much better than our own. It...

read more

The New World Owners — Influencers

The New World Owners -- InfluencersIn twelve years, our President may be a Youtube star! Oh -- let us hope not. Did you know that most of today's influencers are just single person start-ups? What makes them unique is their ability to spot trends and then experiment...

read more

Biological Warfare Against Chinese Pig Farmers.

Biological Warfare Against Chinese Pig Farmers. A bizarre battle between pig farmers and criminal gangs is happening in China. Farmers began using anti-drone technology to stop gangs of criminals from infecting their livestock with diseases that have killed more than...

read more
Malcare WordPress Security