A History of Cyber Warfare – Part 1

Cyberwarfare is becoming a more prevalent form of cyber-attack, and one that may be hard for an individual or a small business owner to understand or defend against.  Of Friday we took a look at the definition and practice of cyber war.  This week we will review the history cyberwar incidents, the attackers, the targets, and the outcome of the best known cyberwarfare ...

Continue Reading →
0

When is a Cyber Attack an Act of Cyber War?

What is a cyber warfare attack exactly, and what is it that separates it from a garden variety cyber attack?  When does a cyber attack cross the line into actual warfare?  Is it a cyber attack launched by a nation-state or other political or quasi-political entity against the resources of another nation-state?  What separates cyber war from actual armed conflict?  The answers are surprising.

I ...

Continue Reading →
0

Do You Accept Credit Cards? How Credit Card Breaches Happen

If your business accepts credit cards for payment, then your a subject to the regulations of the Payment Card Industry.  This is known as PCI-DSS Compliance.  PCI compliance company Security Metrics recently released an infographic that shows the main compliance failures that lead to credit card breaches in 2017.  Here are some of the startling take-aways:

  • Businesses that took credit cards ...
Continue Reading →
0

Congress Acts To Secure Electronic Voting Machines

As long as we are on the subject of election rigging and tampering, it is notable that Congress has finally weighed in on the subject of insecure and hackable electronic voting machines.  According to a recent TechDirt article, “A new bipartisan bill has been introduced, called the Secure Elections Act, that would actually target ...

Continue Reading →
0

Spy vs. Spy vs. Spy – What Countries Are Using Cyber-Espionage Tactics?

The press has been relentless lately in its coverage of Russian cyber-espionage and disinformation campaigns on Facebook and other social networks prior to the last US Presidential campaign.  But is Russia the first to engage in election rigging on this sort?  Hardly.  We thought that looking at the state of cyber-espionage as a tactic in international relations might be interesting, and we were right.  It turns out that cyber-espionage is not ...

Continue Reading →
0

Jail Time for Executives Who Fail To Report A Breach?

Since Equifax leaked credit and identity information on ALL of us last year, I have been in a foul mood about the clueless and technically inept C-level corporate executives who are responsible for these breaches.  Throw the bums in jail!

Well, a law working its way through Congress may do just that.  For the first time executives may be facing not just ritual termination, and shaming in the press, but actual hard ...

Continue Reading →
0

Beginning of the End for Anonymous Crypto-Currency?

One of the major attractions of Bitcoin, Etherium, Monero and other crypto-currencies has been the ability to keep your transactions anonymous, away from the prying eyes of governments, law enforcement agencies, and anyone else.  A recent ruling in a federal district court in California will change that.

The court ordered popular crypto-currency exchange and wallet service Coinbase to turn over records on more than ...

Continue Reading →
0

Sunday Funnies – A Dilly Dilly of a Cease and Desist

Merry Christmas from WyzGuys.  Here is a bit of good news.  Trademark infringement C&D done right with a sense of humor.  Make sure you watch the video.  The video is from Budweiser’s Facebook page.  You may have to turn on the sound in the video window.  Enjoy.  I may even drink a Bud Light in honor of the King of Beers.

From Tech Dirt:

Minneapolis brewery, Modist Brewery, recently unveiled a new double IPA it ...

Continue Reading →
0

An End To Robocalls?

Good news from The Federal Communications Commission (FCC).  Telephone service providers will be legally able to block automated phone calls, commonly known as robocalls.  The new rules enable telephone service providers to block robocalls before they get to our phones. This includes calls from phone numbers on a Do-Not-Originate (DNO) list and those numbers that show up in Caller ID that are “invalid, unallocated, or ...

Continue Reading →
0

Why We Want Network Neutrality Back

I like to keep the nasty business of politics off of this website, but every now and again it rears its ugly head in ways we cannot ignore.  Net neutrality is one of those issues.

Politically, I am a fiscal conservative and a social liberal, and voted Libertarian in the last election.  I did not vote for Trump, and I couldn’t vote for Hilary, either.  As predicted, Trump is dismantling a lot of the Obama administration’s legacy, and network neutrality is ...

Continue Reading →
0
Page 2 of 9 12345...»