No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
The Federal Trade Commission (“FTC”) reached a settlement with stalkerware app company Support King, LLC d/b/a SpyFone.com and its CEO (collectively “SpyFone”) to resolve allegations that it secretly harvested and shared...more
A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more
I am speaking at a conference in one of my favorite cities (okay, it’s Chicago) and I was having dinner at the bar when the patron next to me asked me what I do for a living. ...more
On the heels of the ransomware that had the City of Atlanta scrambling last week, Mayor Bill de Blasio announced the launch of “NYC Secure,” a free mobile app that will alert New York City residents of suspicious activity...more
Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more
There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more
When talking to colleagues and friends, it appears that folks do not understand how their smartphones work and the data that can be accessed through them. This prompted me to again give basic steps that can be used to protect...more
According to bloggers on techtarget.com, security risks around the internet of things (IoT) continue to be problematic, and a new free guide, “The Developer’s Guide to IoT” has been published specifically for IoT device...more
Researchers at cybersecurity firm AlienVault have discovered a computer virus of North Korean origin which infects and hijacks computers in order to mine Monero, a private digital currency which styles itself as “secure,...more
AT&T has dropped plans to sell the Mate 10—the newest smartphone from China’s Huawei Technologies—just before the partnership was to be announced. AT&T gave no reasons for its abrupt reversal, but lawmakers have recently...more
Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more
Uber’s got more than a spot of bother on its hands in London after this morning’s announcement that the company’s largest market in Europe won’t renew the ride-hailing service’s license to operate in the city (citing “a lack...more
You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more
A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more
University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more
Here’s some more good news. Not really. According to a recent report by Nokia, malware infections against mobile devices were at an all- time high in 2016. Infections on smartphones rose almost 400 percent and...more
For decades, it has been assumed that MacBook and iPhone devices are hack proof and virus free. Their advertisements and claims for being indestructible were never questioned. Yet, nothing is truly immune to intrusion....more
A picture might be worth a thousand words, but could it also be worth a thousand dollars? New technology by MasterCard and Amazon may mean that the new hammock you’ve been eying online is only a camera flash away....more
Last week, Brian Krebs reported that hackers using a malware dubbed “Marai” have identified hundreds of thousands of home and office devices that have weak security. Then the hackers released the malware publicly so anyone...more
When I train clients’ employees on data privacy and security, I always mention the microphone on smartphones. They are powerful and if you allow apps access to your microphone, they can listen to every one of your...more
I am pretty up to date on data privacy and security and technology, but the 60 Minutes episode this past Sunday night floored even me. If you didn’t see it, it is worth streaming. Basically, 60 Minutes showed Karsten...more
A Forbes reporter was able to hack into a home alarm system in San Francisco using a browser and “easily-guessable passwords.” The hacking was with permission of the owner but allowed him to make his point—that he could...more
Shiran Kleiderman of K2 Intelligence looks at how wearable technology and the Internet of Things can help boost enterprise security, when done right...more
I’ve always known that my smartphone had a microphone. If nothing else, it obviously has to be used for the Shazam app so I can figure out the name of that great song. So that is the only time I use the microphone on my...more
Labor Day was the backdrop for a big announcement from President Obama. Beginning in 2017, federal contractors must grant paid sick leave to employees. The new Executive Order requires contractors to provide one hour of...more