Where Does Cell Phone Location Data Go?

Have you ever wondered what happens to the location information your smartphone is collecting about you?  Who has access to that information, and for what purpose?  As it turns out, as told in a recent report by Brian Krebs, this information is available to pretty much anybody.

A related article in Sophos’ Naked Security blog pointed to a Continue Reading →

0

Is The End Near For Re-Used Passwords

What do you think about a plan that would actually make it impossible for you to use the same password on two or more sites?  Basically, when you set up a new web account, you would be forced to use a password that was truly different from other passwords you use elsewhere?

I am certain that if you are reading this blog, that you ...

Continue Reading →
0

The Role of the IC3 in Cybercrime Prosecution

If your business has been the victim of a cybersecurity incident, data breach, or other cybercrime, you may have had to decide whether to keep the incident to yourself, or report the crime to the police.  If you carry cyber insurance, reporting the crime is a requirement to file an insurance claim.  So you called the police and filed a report,  You may have been discouraged by the lack of enthusiasm ...

Continue Reading →
0

Hacking Your Browser for Personal Information

Did you know that web browsers such as Chrome, Edge, Firefox, Safari, and Internet Explorer save a lot of personal information that a cyber-attacker could us as research to build a web dossier about you, your likes, and your habits?  A personal dossier that could be used for a deeper attack?

Did  you know that web browsers store parts of web pages ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


FBI Releases IC3 2017 Internet Crime Report

05/07/2018 08:30 PM EDT  Original release date: May 07, 2018

FBI has released the Internet Crime Complaint Center (IC3) 2017 Internet Crime Report, which highlights scams trending online. The top three crime types reported by victims in 2017 were non-payment/non-delivery, personal data breach, and ...

Continue Reading →
0

How Secure Are Mobile Payment Apps Anyway?

The latest trend in the card payment universe are the mobile payment apps that let you use a smart watch or smartphone in place of a credit card.  Just how secure are these payment systems?  One of my regular readers, Eric Morley, owner of Big Frog Custom T-Shirts in Woodbury, MN, asked me that question via LinkedIn, and I thought it was a great idea for an article.  ...

Continue Reading →
0

Password Spraying is a New Type of Brute Force Attack

Password spraying is a new password exploit that is being used effectively against larger networks.  It’s become enough of a problem to merit an alert from US-CERT entitled TA18-086A: Brute Force Attacks Conducted by Cyber ActorsHere’s how it works.

Typically, in a traditional brute-force password attack, the password cracking software runs a long list of every possible password against a system.  In ...

Continue Reading →
0
Page 4 of 44 «...23456...»