Again with a sign meme from Pinterest. You can find a similar sign at Not Just A Bar in Bayport MN.
Continue Reading →FEB
Again with a sign meme from Pinterest. You can find a similar sign at Not Just A Bar in Bayport MN.
Continue Reading →The Singularity. Artificial Intelligence. Self-aware, self-actuating, and self-learning robots. What will our future be like when the machines become self-aware? Will it be the like the T-1000 from Terminator? Or more like Johnny 5 from Short Circuit? Or Andrew from Bicentennial Man? Here is a run-down of four different versions of our electronic and digital future.
A recent book by Martin Ford, Rise of Robots: Technology and the Threat of a Jobless Future, examines a world in the all ...
Continue Reading →If you are in high school (or junior high) or college, attracted to technology, and looking for a career with a future, then you should give serious consideration to the field of Cybersecurity. A recent press release from Cybrary reveals the results of its Cyber Security Job Trends Survey for 2016. Cybrary surveyed 435 senior level technology professionals, and the results indicated a pressing need for more skilled ...
Continue Reading →Last week we took an in depth look at social engineering, and looked a phone and email examples in depth.
Cybersecurity awareness training is one of the most effective ways to combat these threats. Not everyone engaged in cybersecurity practice agrees about the effectiveness of this solution, but I have been delivering public cybersecurity courses for over a decade, and I know from the responses ...
Continue Reading →Here’s a provocative statement: If you could just prevent your staff for clicking on links or opening attachments in phishing emails, 95% of your cybersecurity problems would be prevented.
As perimeter defenses and anti-malware software products have become more effective, cyber-attackers have turned to the phishing email approach as their number one favorite method for acquiring user names and passwords or gaining unauthorized access to computers on your network. The ...
Continue Reading →Your phone rings. The caller identifies themselves as someone from a “tech support” company. Your computer has problems, he says, and he called to help you fix them. You agree to pay some sort of fee. You help them set up remote access to your computer. And now you have been hacked and helped them do it.
Would you respond the same way if ...
Continue Reading →This should really be called “anti-social” engineering. A good definition is “social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.”
My article on Wednesday will give an example of phone based social engineering – the fake tech support ...
Continue Reading →Being of German heritage, I am always fond of German humor. Yes there is such a thing!! Come on!! Anyway, from Pinterest again.
Continue Reading →There is a small company in the Czech Republic called Turris that developed a home and small office wireless router that may be the most secure small router available. That is – when it’s available in April. Right now its an Indegogo project. You can pre-order it now for about $200.
This is an open-source project running OpenWrt. According to the manufacturer, the router will be available in ...
Continue Reading →