21 Apr 2018

Is “Security by Obscurity” an Obsolete Concept?

The term “security by obscurity” has been around for a long time. Traditionally, this has referred to the idea that the best way to keep a system safe is to keep its design (and any potential vulnerabilities) a secret. To many, “security by obscurity” has also represented the idea that there is safety in numbers, such as on a social media network that has hundreds of millions of users. One might argue that the intersection of social media,... Read more...

28 Sep 2017

$4 Billion: The True Cost of a Data Breach

Equifax has lost over $4 Billion or about 25% of its market value as well as the CEO, CIO and Chief Security Officer, following the data breach announced in early September. Over 50 class action lawsuits have already been filed against the Company and there may be a congressional investigation into the breach. Consumers whose data was stolen will spend time and money ensuring that their financial data is secure. They will be spending sleepless nights... Read more...

14 Aug 2017

Imposter Email Lures White House Staff

Email Prankster Threatens National Security Why was the newly minted White House communications director, Scaramucci, fired? We don’t know for sure. But an examination of his emails would have shown that he spent the weekend responding to spear phishing emails purported to be sent from Reince Preibus, former White House chief of staff. Politicians in Washington struggle to create their own identities and maintain good relationships with colleagues.... Read more...

29 Jun 2017

Mexico Takes Up Cyberarms

The Other White House  There is another White House south of the border and a series of scandals to match.  A $7 million second home, known as “Casa Blanca”, was built for Mexican President Enrique Peña Nieto by a prominent government contractor. This apparent conflict of interest created a huge scandal. The journalists who investigated the “White House Scandal” along with much more serious crimes, were attacked with government-exclusive... Read more...

18 May 2017

The Death of Ransomware?

(WCry) was successful in infecting over 300,000 computers in 150 countries. It is likely the worst ransomware attack to date. WCry works by locking the files with encryption on each device. Victims are promised a decryption key to unlock their files once they pay a ransom of $300 in Bitcoin. But incredibly, as pervasive as the WannaCry attack has been, it’s creators have only collected about $80,000 in Bitcoin ransom. Less than 0.1% of the victims... Read more...

31 Mar 2017

The Honeypot for Hackers: Twitter Heats Up

Author: Tags:

The average Internet user has over 100 online accounts, according to Dashlane. Who on earth can keep track of that many accounts? No one really. That’s why millions of people use password managers to keep their passwords encrypted and organized. Typically, password managers are apps that encrypt and store your passwords in the cloud or locally on your computer, requiring you to use just one secure password to access all your passwords. Convenient,... Read more...

17 Mar 2017

Why Hasn’t Anyone Thrown Out Their Microwave?


Were you shocked to learn that Wikileaks had published “Vault 7”, leaked documents that reveal the intricate details of CIA’s hacking capabilities? Were you extremely concerned that the CIA has now “lost control” of these tools to the public domain, meaning that any cybercriminal in the world can now learn these methods and use them against you? Did the recent news cause you to take a long and close look at every sensor on your iPhone or... Read more...

10 Mar 2017

Driving Blind with Uber and Waze


While apps like Waze, Uber and Apple Maps may be helping to ease some of your transportation woes, recent stories suggest we should think twice before blindly trusting these apps to work in our best interests. Apps designed to route people – either you or drivers looking to pick you up – rely on a lot of data: traffic data, location data, user-reported data, even personal data (Who is requiring a pickup? Where do you often visit late at night?).... Read more...

27 Feb 2017

Email Privacy Act Passes Unanimously in the House of Representatives


Yes, it’s true. The House of Representatives unanimously passed the Email Privacy Act. The fact that everyone in the House can agree on the importance of email privacy suggests that Americans overwhelmingly consider email privacy an essential right. The federal government currently has the right to seize any email, or cloud file that is more than 180 days old, without getting a warrant. This has been true since the Electronic Communications Privacy... Read more...

20 Feb 2017

What Has a Longer Aftertaste: Colorado Brownies or Russian Forged Cookies?

When the politicians in Colorado legalized cannabis, we all learned about the after effects of Rocky Mountain brownies – but the calories and cannabis burn off after a few hours. What about Russian Forged Cookies? While these “cookies” are tasteless, they have long-lasting after effects that can be costly. What is an HTTP cookie? An HTTP cookie is a small piece of data sent from a website and stored on your computer, used by websites to remember... Read more...