On Wednesday we looked at several of the important takeaways from this year’s Cyber Security Summit. Here are a few more.
- Small businesses need to stop using public email services such as Gmail, Yahoo, or Hotmail for their business email. User credentials for 500,000 Yahoo email accounts have been stolen, and it could happen to the others. If you have a domain name you are using for a web site, then you should ...
OCT

Years ago I heard a story about someone on a job interview was asked by the hiring manager for the user ID and password to their Facebook account. My response, then and now, was “sure – but you first.” The idea being if you want to know that much about my personal life, then I want to know the same about you. Maybe ...
You don’t need to be a journalist, freedom fighter, or living under an oppressive political regime to have the desire for some online privacy. Maybe you are trying to put the contents of your life back into the Pandora’s box you opened when you signed up on Facebook. Maybe you would like a little privacy in your online life.
I read about this on
I discovered a while ago that my LG smart phone can be used fairly easily to make a surreptitious video of a meeting simply by turning on the video camera and slipping the phone into a shirt pocket. The camera lens clears the edge of the pocket nicely, and there is no indication, at least on my phone, the the camera is rolling. This is a great way to keep a record ...
Mobile smart devices have all the capabilities of a laptop or computer. What this means from a cybersecurity perspective is that they are every bit as vulnerable as a laptop or desktop computer. The fact that they are small makes them easy for a thief to slip in a pocket or backpack and carry away, along with your personal information, contacts, pictures, geo-location history, and a raft of critical and revealing ...
As we all know, Apple refused to assist the FBI in cracking the iPhone 5c of the San Bernardino “terrorist” killers. The FBI took Apple to court. Then the FBI dropped the case after successfully hacking the phone. Then they successfully hacked another phone in a different case in New York. Information appeared linking Israeli mobile security firm Cellebrite to the successful breach ...
How would you feel if, in order to gain access to a known terrorist’s house, the government passed a law that required every lock manufacturer to create a master key that would unlock every locked door anywhere? What if the police promised that they would only use the key on the one house? What if they promised to keep the key safe and secure so it could never get into the ...