The Latest in Tech Today
Coronavirus bringing out opportunistic Hackers
Coronavirus bringing out opportunistic HackersWhenever there is something in the news we find cybercriminals willing to exploit it in some way. Currently, the big news is the Coronavirus that is spreading from Wuhan, China. We have seen email malware being spread from...
Extensive US Intellectual Property theft by Chinese being investigated by FBI
Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government. They target military sub-contractors and sub-sub-contractors, universities,...
DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa!
DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa! We have a problem with illegal immigrants. Now don’t get me wrong we love immigrants and they can add a lot to our economy but those immigrants come to our country through...
5G Will Be Built-In to Almost Every Device Later This Year — Is Your Security Stance Ready?
5G Will Be Built-In to Almost Every Device Later This Year -- Is Your Security Stance Ready?With 5G on the horizon, we are starting to see a significant expansion of the “Internet of Things” -- and it is creating a huge security challenge for businesses! A bigger...
Israeli Company’s Spyware Used to Hack US Citizens. FBI Now Involved.
Israeli Company’s Spyware Used to Hack US Citizens. FBI Now Involved.US Companies and Citizens may have had their information compromised by the Israeli company, NSO Group through their smartphone-based surveillance software utilized to gather intelligence. According...
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You?We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
“Evil Corp” really does exist, and it’s distributing malware using Microsoft Excel
"Evil Corp" really does exist, and it’s distributing malware using Microsoft ExcelYes, there is an Evil Corp, and it is a Russian backed group of Cybercriminals. They are busy weaponizing Microsoft's popular spreadsheet package, Excel, so that it can carry its malware...
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups.Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Our Personal and Brand Reputations are At-Risk By Nation-States
Our Personal and Brand Reputations are At-Risk By Nation-StatesNation-States are no longer interested in just disrupting our politics. Not much money in that. With armies of cybercriminals, nation-states are going after our businesses with the goal of economic...
Do You Use Trello? Search turns up massive trove of private data
Do You Use Trello? Search turns up massive trove of private dataDo you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration. However, it must get set up correctly if you want to...
Most Businesses Attacked By Business Email Compromise Last Year
Most Businesses Attacked By Business Email Compromise Last Year2019 was the year for Business Email Compromises also known as BEC attacks. In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Keeping Legacy Software Safe
Keeping Legacy Software SafeThe primary problem with legacy software is keeping it secure. Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered. That means that they were not designed...
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses
Downtime and Costs Double as Ransomware Attacks Hit Larger BusinessesNew and sophisticated ransomware attacks are being perpetrated on all types of businesses including large companies and government entities. This deep pocket targets are driving the costs up by...
Employee Training Key to Spotting Existing and Emerging Threats
Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations. Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...
Regulatory Compliance: The Perception and The Reality
Regulatory Compliance: The Perception and The RealityRegulatory compliance. We have all heard the term and for many business owners, the way to handle it is to stick their head in the sand and stay out of the spotlight. Why? It is complicated and expensive and they...
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone HackWho are you hiring? Did you do your due diligence? I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince. ...
Searching For A Job Online — FBI Warns About Rising Number Fake Employers
Searching For A Job Online -- FBI Warns About Rising Number Fake EmployersIt seems as though the only way to get a job these days is to apply online. Very few companies will take a written resume or schedule an interview until you have applied online through a job...
What Does Your Employer Know About Your Daily Activities
What Does Your Employer Know About Your Daily ActivitiesHow much does your employer know about your personal life? Maybe more than you realize. When you use your personal devices to access company servers they can log your activities. Then they can track when you log...
Privacy Gone: Tech Start-up Has Huge Facial Recognition Database
Privacy Gone: Tech Start-up Has Huge Facial Recognition Database What if I told you that there was a biometric artificial intelligence program that might end privacy as we know it… would you believe me? What if I told you that the company that developed it was...
If You Can’t Beat ‘Em – Join ‘Em says Marriott
If You Can’t Beat ‘Em - Join ‘Em says MarriottIf you can’t beat them...join them. That was the thought that made one of the largest hotelier chains offer luxury homes and premium properties under their name. There are times when you would prefer to have the comforts...
Screen Time Causing Mental Health Issues Are Overblown
Screen Time Causing Mental Health Issues Are OverblownTurns out that all the hub-bub about technology affecting the mental health of our teenager by increasing anxiety and depression may be quite over-blown. It turns out that when you look at all the studies and...
Big Tech Stomps All Over Small Businesses
Big Tech Stomps All Over Small BusinessesAre small tech companies being squeezed by tech giants? You bet and it has happened numerous times. Sometimes they announce a big product or service, never planning to ever bring it to market. They drive excitement for their...
Home Security and Alarm Systems Useless After Charter Cable Pulls Plug
Home Security and Alarm Systems Useless After Charter Cable Pulls PlugWhat happens when a cable company shuts down a product they previously sold to customers? What happens when they refuse to refund customers for proprietary products they purchased to support the...
Security First, Apple Stands Ground on iPhone Encryption
Security First, Apple Stands Ground on iPhone EncryptionThe Apple iPhone platform is based on security first. It is designed to be secure and private. To do that they use a proprietary encryption system. While there have been private companies who have tried to break...
No Security for Windows 7 After Today
No Security for Windows 7 After TodayAre you using Windows 7? Did you know some of the largest firms in the country (even large financial institutions) are still using it? Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...
Technology Can Only Protect You So Much — Then Other Tactics are Needed
Technology Can Only Protect You So Much --- Then Other Tactics are NeededBusinesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the cyber-attack...
Zero-Day Browser Vulnerabilities
Zero-Day Browser Vulnerabilities“This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...
A Lesson to Learn – If it is Connected It can Be Hacked
A Lesson to Learn - If it is Connected It can Be HackedI remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product was...