The Massive U.S. Capitol Attack We’re Ignoring

The Massive U.S. Capitol Attack We’re Ignoring

Capitol Attack Could Go Way Beyond a Physical Breach When Trump supporters occupied the US Capitol last week, hundreds of...
Read More

Twitter Hack Reminds Us That David Can Still Fell Goliath

The twitter hack began as a quiet scheme to steal and sell unusual user names, which carry high currency in...
Read More
Were Lebron’s Darkest Secrets Exposed by Hackers?

Were Lebron’s Darkest Secrets Exposed by Hackers?

Grubman Shire Hack: REvil Scores a Blackmail Slam Dunk How much is basketball megastar Lebron James brand worth to hackers? ...
Read More
Don’t Be Naive: Obama/Biden “Twitter Hack” Not What It Seemed

Don’t Be Naive: Obama/Biden “Twitter Hack” Not What It Seemed

I'm betting that the recent Twitter hack of prominent political and celebrity Twitter accounts was politically motivated and nation-state operated....
Read More
Cybersecurity Experts Fight for Your Encryption Rights

Cybersecurity Experts Fight for Your Encryption Rights

Cybersecurity experts and privacy advocates like myself are stepping up to protect strong encryption standards, which are facing an all-out...
Read More
iPhone Security Crash Course: 13 Hacker-proofing Tips

iPhone Security Crash Course: 13 Hacker-proofing Tips

iPhone Security In the Mid/Post-Pandemic World We are no longer just addicted to our iPhones; we are officially in a...
Read More
Coronavirus Scammers User Fake Sites to Steal Your Stimulus

Coronavirus Scammers User Fake Sites to Steal Your Stimulus

Coronavirus Scammers Are After Your Stimulus Check Scammers and cybercriminals love to exploit the headlines. COVID-19 isn't the only pandemic...
Read More
Zoom Security in 7 Steps (Video + Graphic)

Zoom Security in 7 Steps (Video + Graphic)

Since this video was recorded, Zoom has issued several security updates. Learn more at the Zoom Security web page and...
Read More
Cybersecurity for Your Home or Virtual Office

Cybersecurity for Your Home or Virtual Office

Cybersecurity Virtual Office Key Links from the Webinar: ZOOM Sileo Security Video Password Managers Review Data Backup Physical/Cloud Backup  ZOOM...
Read More
Coronavirus Cyberscam Alert: Protect Your Digital Health and Safety During a Pandemic.

Coronavirus Cyberscam Alert: Protect Your Digital Health and Safety During a Pandemic.

Hey, this is a bit of a solemn and serious video today. First of all, my heart goes out to...
Read More
Telemedicine: Are Virtual Doctor Visits a Cyber & Privacy Risk?

Telemedicine: Are Virtual Doctor Visits a Cyber & Privacy Risk?

The Trump administration has relaxed privacy requirements for telemedicine, or virtual doctor visits: medical staff treating patients over the phone and...
Read More
Are Hackers Targeting Your Association? Here’s How to Stop Them.

Are Hackers Targeting Your Association? Here’s How to Stop Them.

Are hackers targeting your association? The recent revelation that Chinese hackers penetrated the internal computer network of the National Association...
Read More
Democracy @ Stake: 2020 Election Interference DejaVu

Democracy @ Stake: 2020 Election Interference DejaVu

What you need to know about Russia's 2020 election interference Last week, the director of national Intelligence (DNI), a Republican...
Read More
Private Eyes Are Watching You: What it Means to Live (and Be Watched) in the Surveillance Economy

Private Eyes Are Watching You: What it Means to Live (and Be Watched) in the Surveillance Economy

What it is the Surveillance Economy How do you feel about the fact that Facebook knows your weight, your height,...
Read More
Small Business Cybersecurity: 5 Steps to Stop Cybercrime 

Small Business Cybersecurity: 5 Steps to Stop Cybercrime 

Small Business Cybersecurity Gone Terribly Wrong  On August 12, 2003, as I was just sitting down to a tea party...
Read More
Data Integrity Attacks: How Cybercriminals Manipulate Rather Than Steal Your Info

Data Integrity Attacks: How Cybercriminals Manipulate Rather Than Steal Your Info

You're rushed to the hospital after a serious car accident. Doing her job, the admitting physician verifies your blood type...
Read More
The Unlikely Weapon in Cybersecurity: Going Analog

The Unlikely Weapon in Cybersecurity: Going Analog

Rule #1: Technology is highly unpredictable when it's new & untested. And even worse when it's insecure. All of us have...
Read More
Top Cybersecurity Trends 2020 & the Perils of Prediction

Top Cybersecurity Trends 2020 & the Perils of Prediction

(i.e., Cybercriminals read the same articles as cybersecurity experts) Oh how we love to predict the future. Who will win...
Read More
Google Isn’t Just Buying Fitbit, They’re Tracking Your Donut Habit

Google Isn’t Just Buying Fitbit, They’re Tracking Your Donut Habit

Spinning Wildly on the Hampster Wheel of the Surveillance Economy You’re heading to the gym for a workout when you...
Read More
Disinformation Campaigns Are Coming for Your Bottom Line 

Disinformation Campaigns Are Coming for Your Bottom Line 

The rise of disinformation campaigns could put the reputation of your company at risk Imagine waking up to find the...
Read More