Using Your Phone For Video Surveillance

smartphone-videoI discovered a while ago that my LG smart phone can be used fairly easily to make a surreptitious video of a meeting simply by turning on the video camera and slipping the phone into a shirt pocket.  The camera lens clears the edge of the pocket nicely, and there is no indication, at least on my phone, the the camera is rolling.  This is a great way to keep a record that ...

Continue Reading →
0

Now The FBI Can Legally Hack Your Computer

image_thumbA recent rule by the Supreme Court has given the FBI authority to hack your computer if it is inadvertently part of a criminal botnet.  Recent changes to a procedural rule known as Rule 41 allows the FBI to obtain a search warrant to use “network investigative techniques” or NIT (or more commonly called hacking) to search computers engaged in criminal activity anywhere in the world.  This includes innocent computer users ...

Continue Reading →
0

The Aftermath of Apple vs. The FBI

applelogoAs we all know, Apple refused to assist the FBI in cracking the iPhone 5c of the San Bernardino “terrorist” killers. The FBI took Apple to court.  Then the FBI dropped the case after successfully hacking the phone.  Then they successfully hacked another phone in a different case in New York.  Information appeared linking Israeli mobile security firm Cellebrite to the successful breach of ...

Continue Reading →
0

Tax Dollars At Work – Good News For A Change

scalesThe US House of representatives passed the Email Privacy Act.  Finally the Congress passes a bill that actually protects the public from warrantless search and seizure of email records.   What makes this vote special is that it was unanimous – 419-to 0!  When does that ever happen?  Rarely, but considering this bill would protect our representatives too, maybe not all that surprising.

This bill ...

Continue Reading →
0

IRS Strikes Again – IP PIN Epic Fail

irs-logoWe wrote last year about how the IRS and their Get Transcript service was instrumental in helping identity thieves file fraudulent tax returns for big refunds.  The problem was that the IRS used static user identity information that was available elsewhere online.  They promised to fix this security problem, but have not.  This year, many users of the IP PIN  system that was supposed to harden security ...

Continue Reading →
0

CIT Cybersecurity Featured in New Business Minnesota

We were recently featured in the January edition of New Business Minnesota.  This is a monthly business magazine published by Pat Boulay.  You can download a copy of our featured article, Cyber-criminals Put Every Business At Risk, here.  There are some additional helpful links below the picture.

NBM-cover

Pat also runs a great business networking meeting once a month as well, on ...

Continue Reading →
0

US Gov Ups Its Cybersecurity Game

white-houseI was surprised to discover proof that my business is a target of cyber-criminals.  After installing some security and reporting tools on my websites, I was alerted to the almost constant state of attack that they were under.  And all I am doing is writing a cybersecurity blog.  And you, dear reader, what of your business?  There is a good chance that you are too, but simply don’t know it because ...

Continue Reading →
0

Anonymous Declares War on ISIS

anonymous-isis-550Can we stop calling this terrorism, and call it what it is – warfare!

The day after ISIS claimed responsibility for the acts of war carried out in Paris by trained members of the ISIS military, members of the hacker collective Anonymous declared war on ISIS.

“On Friday 13 November our country France was attacked in Paris for two hours, by multiple terrorist ...

Continue Reading →
0

000Webhost Loses Plaintext Passwords

000WebHost

This comes under the heading of “know who you are doing business with.”  Web hosting company 000webhost.com was breached this week and over 13 million customer records were stolen and posted for sale on the Internet.  The data includes customer names, emails and passwords in plaintext  (meaning the passwords were unencrypted).  Storing passwords in an unencrypted form should be a criminal act in itself, ...

Continue Reading →
0
Page 3 of 5 12345