Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Finally – Your Tax Dollars At Work Doing Something Useful for Small Business Owners

JFTC Releases Article on Protecting Small Businesses from Cyber Threats

Original release date: July 13, 2020

The Federal Trade Commission (FTC) has released an article on their Protecting Small Business playlist, which is a collection of videos with tips for ...

Continue Reading →
0

Your Smartphone Is Tracking Your Every Move

The fact that your smartphone is tracking you should not be a surprise.  What is surprising is the astounding depth of detail that is collected about when and where you have been since the day you activated your phone.  Today I am going to show you how to uncover this information.  And delete it if you choose.

The iPhone and Significant Locations

If there ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Bogus Security Technology: An Anti-5G USB Stick

[2020.05.29] The 5GBioShield sells for £339.60, and the description sounds like snake oil:

…its website, which describes it as a USB key that “provides protection for your home and family, thanks to the wearable holographic nano-layer catalyser, which can be worn or ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


[WordPress Security] Large Scale Attack Campaign Targets Database Credentials

The Wordfence Threat Intelligence Team just published details of an attack harvesting database credentials, targeting over 1 million WordPress sites. For 24 hours, attacks from this campaign accounted for 75% of all exploit attempts on plugins and themes across all of WordPress.

Both the free and paid versions ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Pac-Man Turns 40

The classic arcade game—which turns 40 on May 22—made history by launching an unprecedented merchandise empire. But Pac-Man was innovative in other ways, too. During a time when video games’ default audience was adult men, Pac-Man successfully engaged women and children, becoming one of the first games to broaden the medium’s appeal in ...

Continue Reading →
0

“Sandworm” Is The True Story About Russian Cyberwarfare

Last month I read the book Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers, by Andy Greenberg, senior writer for Wired magazine.  If you want to understand how cyber-war has changed the face of military operations in the 21st century, this book explains everything.  This book has put the threat ...

Continue Reading →
1

With “Friends” Like The Saudis, Who Needs Enemies?

Or The Strange Case of Jeff Bezos’ IPhone and the Saudi Crown Prince

The evidence says that the Saudi Arabian Crown Prince, Mohammed bin Salman (aka MBS) engineered a way to hack Jeff Bezos’ cell phone.  Just why MBS would be interested in Jeff, Jeff’s phone, or Jeff’s life is an interesting question, with surprising answers.

It seems that MBS invited Jeff Bezos to a private party, and during the course of ...

Continue Reading →
0

Staying Private Online Using Popular Browsers

Is there a way to maintain privacy online, and defeat tracking without resorting to extreme measures?  We have written articles recently about the most private browsers, but using them requires changing habits and abandoning web browsers that you are already familiar with.

I came across this graphic on Pinterest, and thought it was worth sharing.  It shows some ...

Continue Reading →
0

Tomorrow Is Data Privacy Day

Keeping your information private is nearly impossible these days.  The Internet has turned us all into virtual blabbermouths oversharing everything.  And what we aren’t already sharing with wild abandon is being harvested, parsed, analyzed, stored in endless databases, and sold by big Internet companies.  Then that information is stolen by cyber-criminals and sold on the Dark Web.

The task of keeping our information private seems impossible, but there still are actions ...

Continue Reading →
0
Page 1 of 9 12345...»