From Pinterest
Continue Reading →OCT
As cybercriminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs worldwide, ISC(2) found.
Original release ...
Continue Reading →I found this on Pinterest, and liked it enough to post it. Now if I just could find a woman who still uses bobby pins.
Continue Reading →
You might have heard that the founder of Twitter, Jack Dorsey, recently had his Twitter account hijacked. You are probably wondering how a tech-savvy founder of a technology company could possibly lose control of his account at his own company. Personally, I can’t think of anything more embarrassing. It turns out the culprit was his phone. Specifically, the SMS texts ...
Continue Reading →A couple years ago, it looked like crypto-ransomware attacks were falling by the wayside. Business email compromise (email account hijacking) and associated wire transfer fraud were becoming easier and more successful for cyber-criminals than ransomware. I made some predictions in this blog and in public presentations that ransomware had seen it’s day. Unfortunately, I was wrong. In 2018 ...
Continue Reading →Here’s what’s wrong with one-size-fits-all education systems. From Pinterest
Continue Reading →Under the overarching theme of ‘Own IT. Secure IT. Protect IT.’, the 16th annual National Cybersecurity Awareness Month ...
Continue Reading →Late in August and early in September, I was back in the classroom again teaching a great bunch of beginning IT technicians the finer points of networking so they can pass the CompTIA Network+ certification exam. They asked me for a list of the tools that I use on the job. Once I had put the list together for them, it looked like ...
Continue Reading →A new botnet known as “Ares” is targeting misconfigured set top boxes that run the light-weight Android OS. Two older botnets, Fbot and Trinity, are also targeting this misconfiguration. A module, the Android Debug Bridge (ADB), is the specific vulnerability, and it should not be available at all. The debug bridge is used by software developers during code writing to check for ...
Continue Reading →If you visited certain websites with your iPhone (or Android or Windows device**) over the last two years, it is possible that your iPhone downloaded and installed malware that allowed attackers to intercept and record everything you did and everywhere you went with your iPhone. This includes real-time location information, all your emails and messaging (including encrypted versions ...
Continue Reading →