NIST Cybersecurity Framework Turns 5

If you are a small business owner or even the manager of a bigger enterprise, the NIST Cybersecurity Framework can help you create a cybersecurity program that works.  The framework is voluntary, which means you can pick and choose the parts that work best for your organization.

When developing your program, starting with NIST can make the process simpler.  You ...

Continue Reading →
0

Cyber War is the Next Arms Race

Anyone who thinks were are not already at war in cyber-space is just not paying attention.  I have written extensively on the subject of cyber-war in this blog, most recently about the Estonian cyber-militia.  A list of those articles is below the video.

On April 22, 2019, Mikko Hypponen presented a keynote address titled The Next Arms Race.  A 58 minute video is included below.  ...

Continue Reading →
0

Millions of Chinese-made IoT Devices Easily Hacked says Brian Krebs

If you bought a security camera, webcam, baby monitor, smart doorbell, digital video recorder or other IoT device manufactured in China, there is bad news.  Security flaws have been discovered that can easily  allow an attacker remote access, remote control, and password discovery on affected systems.  These devices can also be hijacked to use in a variety exploits including eavesdropping through ...

Continue Reading →
0

Top Jobs In Cybersecurity Pay Six Figures

Are you working in information technology, but your career has gone stagnant or your work become boring and repetitive?  Are you graduating from high school and considering career paths.  Are you in college earning a “computer science” degree and wondering if you will be writing code your whole life?  Maybe you should consider a career in cybersecurity.

I was interested in security ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


May the Fourth Be With You

It’s Star Wars Day!!  May the force be with you.  Jedis, Greys, and Sith unite for a day for video watching and beer.


Huge Win 10 version 1903 requires 32 GB to install

You might want to check your free space on your C drive before Patch Tuesday ...

Continue Reading →
0

Guest Post – Mobile App Security Threats and Secure Best Practices Part 2

A guest post by KC Karnes

Mobile App Security Exploit Examples: Painful Real-life Lessons

The climate around mobile app security is heating up.

Mobile app vulnerabilities are exploited every day, resulting in expensive data breaches and loss of public trust.

In this section, we will try to learn from the failures of other companies and highlight how real the threats outlined above can be.

Timehop Fails To Trust Two-Factor Authentication

Starting in December of 2017, TimeHop was ...

Continue Reading →
0

Guest Post – Mobile App Security Threats and Secure Best Practices Part 1

A guest post by KC Karnes

Is your mobile app secure?

It shouldn’t come as a surprise that mobile apps are targeted by hackers, given the rapid adoption and increased usage globally. By some estimates, one out of every 36 mobile devices has high-risk apps installed.1

An even more sobering mobile app security statistic for businesses to hear: 71% of fraud transactions came from mobile apps and mobile browsers in the ...

Continue Reading →
0

Guest Post – The Ultimate Online Privacy Guide Part 3

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scoped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we publish the second of ...

Continue Reading →
0

Guest Post – The Ultimate Online Privacy Guide Part 2

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scoped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we publish the second of ...

Continue Reading →
0
Page 4 of 71 «...23456...»