Here’s a guy that is desperate to get a new phone, but not just because he wants the upgrade! Pinterest, of course.Continue Reading →
Years ago, when I was in school, they tried to give us the metric system, but we rejected it. For those of you that need help with conversion, there are ...Continue Reading →
Lately there have been a spate of incidents involving smartphone apps for the iPhone and Android phones that were discovered to be malicious in various ways. The important commonality in these revelations was that cyber-criminals had actually modified legitimate apps by hijacking several developer’s credentials, including their “Developer Certificate.” The developer key provides a digital signature that validates the app as being the ...Continue Reading →
This article is an amusing collision between our last two topics – the problems with two-factor and multi-factor authentication and our four-part story on Google’s data mining habits. Google has developed and released their Titan MFA security key as a more secure way to implement multi-factor authentication that can’t be attacked through phishing and man-in-the-middle exploits. So if you can stand ...Continue Reading →
In our last three posts, we dissected the data collection program on one of the biggest Internet companies, the King of the Internet, Google. Today we are going to provide you with a small set of options you can use to reduce and sometimes eliminate your exposure to data collection, and increase your privacy while online. These solutions will work well not just against Google, but also against the data collection ...Continue Reading →
Now that I know everything about you, maybe I can predict what you are likely to do in the future. In the first two parts of this report, we looked at Google and the many products and services that collect information about you, and just what kind of details are included in that informational trove. Today we will see what that information can do.
Whether you call it bots, AI (artificial intelligence), ...Continue Reading →
If you use a password manager app on your smartphone, it may be vulnerable to package name spoofing, which would allow the password manager’s autofill feature to enter your login credentials on a spoofed web form. This vulnerability applies to popular apps from LastPass, Dashlane, Keeper, and 1Password.
I have been an advocate for password managers. They are part of the solution to creating ...Continue Reading →
New to cybersecurity? Building a successful cybersecurity career begins with taking good foundational steps. In this ebook, two InfoSec professionals share their advice for those just starting out.
A la “Catch Me If You Can” Frank Abignale fame, ...Continue Reading →
You think you are the clever one because you never use the Internet for online banking, online shopping, or managing accounts like your retirement account, gas and electric utilities, telephone, cell phone, and Internet. Open a Facebook account? Never! You think you are safer from account hijacking and identity theft because you never set up any online accounts. If you don’t have it, they can’t hack it – right? Wrong!
If you ...Continue Reading →
In the middle of the day your cell phone mysteriously goes dead. Later on, when you call the cell phone carrier, you find out that someone else pretending to be you has visited a store and claimed to have lost your phone. Customer service agents moved your mobile number to a new SIM card on a new phone, and using your phone and other personal information gathered earlier through phishing scams ...Continue Reading →