I found this on Pinterest, and liked it enough to post it. Now if I just could find a woman who still uses bobby pins.
Continue Reading →
OCT
I found this on Pinterest, and liked it enough to post it. Now if I just could find a woman who still uses bobby pins.
Continue Reading →
You might have heard that the founder of Twitter, Jack Dorsey, recently had his Twitter account hijacked. You are probably wondering how a tech-savvy founder of a technology company could possibly lose control of his account at his own company. Personally, I can’t think of anything more embarrassing. It turns out the culprit was his phone. Specifically, the SMS texts ...
A couple years ago, it looked like crypto-ransomware attacks were falling by the wayside. Business email compromise (email account hijacking) and associated wire transfer fraud were becoming easier and more successful for cyber-criminals than ransomware. I made some predictions in this blog and in public presentations that ransomware had seen it’s day. Unfortunately, I was wrong. In 2018 ...
Here’s what’s wrong with one-size-fits-all education systems. From Pinterest
Continue Reading →
A quick Saturday digest of cybersecurity news articles from other sources.Under the overarching theme of ‘Own IT. Secure IT. Protect IT.’, the 16th annual National Cybersecurity Awareness Month ...
Continue Reading →
Late in August and early in September, I was back in the classroom again teaching a great bunch of beginning IT technicians the finer points of networking so they can pass the CompTIA Network+ certification exam. They asked me for a list of the tools that I use on the job. Once I had put the list together for them, it looked like ...
A new botnet known as “Ares” is targeting misconfigured set top boxes that run the light-weight Android OS. Two older botnets, Fbot and Trinity, are also targeting this misconfiguration. A module, the Android Debug Bridge (ADB), is the specific vulnerability, and it should not be available at all. The debug bridge is used by software developers during code writing to check for ...
If you visited certain websites with your iPhone (or Android or Windows device**) over the last two years, it is possible that your iPhone downloaded and installed malware that allowed attackers to intercept and record everything you did and everywhere you went with your iPhone. This includes real-time location information, all your emails and messaging (including encrypted versions ...