The Massive U.S. Capitol Attack We’re Ignoring
https://www.youtube.com/watch?v=dIdPk25c93M' format='16-9' width='16' height='9' custom_class='' av_uid='av-mo9up3' Capitol Attack Could Go Way Beyond a Physical Breach When Trump supporters occupied the US Capitol last week, hundreds of rioters gained unrestricted access to the offices of our Representatives and Senators . You can see one such invader sitting here in House Speaker Nancy Pelosi's office. But we have to ask ourselves, did...
Read More
Twitter Hack Reminds Us That David Can Still Fell Goliath
The twitter hack began as a quiet scheme to steal and sell unusual user names, which carry high currency in gamer and hacker circles. But as the day wore on, the attack took over dozens of accounts belonging to corporations like Apple and celebrities like Joe Biden, Barack Obama, Bill Gates, Elon Musk and Kanye West. The hackers used the...
Read More
Were Lebron’s Darkest Secrets Exposed by Hackers?
Grubman Shire Hack: REvil Scores a Blackmail Slam Dunk How much is basketball megastar Lebron James brand worth to hackers? When you calculate it, Lebron's name earns him more than his game. And to the cybercriminals who orchestrated the Grubman Shire Hack, that kind of payday is worth jumping through some hoops. Consider what James makes off of his reputation...
Read More
Don’t Be Naive: Obama/Biden “Twitter Hack” Not What It Seemed
I'm betting that the recent Twitter hack of prominent political and celebrity Twitter accounts was politically motivated and nation-state operated. But that's not what "the investigators" say. And that false narrative could have massive implications for your privacy. Here's the background in a nutshell: Approximately 130 high-profile Twitter accounts were hacked on July 15 in what the company is...
Read More
Cybersecurity Experts Fight for Your Encryption Rights
Cybersecurity experts and privacy advocates like myself are stepping up to protect strong encryption standards, which are facing an all-out legislative assault from the current administration and the Senate. But we need the help of business leaders like yourself to maintain the privacy of your data. Here is an excellent excerpt from Joseph Marks of The Washington Post: “The bill, called the...
Read More
iPhone Security Crash Course: 13 Hacker-proofing Tips
iPhone Security In the Mid/Post-Pandemic World We are no longer just addicted to our iPhones; we are officially in a committed relationship, thanks to the pandemic. We mobile office from them, bank from them, attend doctor’s appointments, kids' classes and Zoom happy hours from them. And in the midst of all of this critical and effective use, we are...
Read More
Coronavirus Scammers User Fake Sites to Steal Your Stimulus
https://www.youtube.com/watch?v=WJcT81kawc4' format='16-9' width='16' height='9' custom_class='' av_uid='av-mo9up3 Coronavirus Scammers Are After Your Stimulus Check Scammers and cybercriminals love to exploit the headlines. COVID-19 isn't the only pandemic affecting Americans - so are the scams that go along with it. Case in point: stimulus checks that will help Americans weather the COVID-19 pandemic are already being targeted by scammers, who take advantage...
Read More
Zoom Security in 7 Steps (Video + Graphic)
https://www.youtube.com/watch?v=CTDjDCiI9Hc' format='16-9' width='16' height='9' custom_class='' av_uid='av-mo9up3 Since this video was recorded, Zoom has issued several security updates. Learn more at the Zoom Security web page and don't forget to update to the latest version! Zoom Security Transcript: Hey, everybody. It's good to see you back again. Today we're going to talk about seven steps you can take to lock down...
Read More
Cybersecurity for Your Home or Virtual Office
Cybersecurity Virtual Office Key Links from the Webinar: ZOOM Sileo Security Video Password Managers Review Data Backup Physical/Cloud Backup ZOOM Security & Privacy Page There is something great to be learned about cybersecurity from this pandemic. Preparing for a crisis before it happens is far less expensive than recovering after it happens. The U.S. saved several billions of dollars cutting...
Read More
Coronavirus Cyberscam Alert: Protect Your Digital Health and Safety During a Pandemic.
Hey, this is a bit of a solemn and serious post today. First of all, my heart goes out to all of those communities, families, people that are battling with Coronavirus. Just like our physical health, we have to also pay attention to our digital, or cyber health, and how we watch out for all of the disinformation that is...
Read More
Telemedicine: Are Virtual Doctor Visits a Cyber & Privacy Risk?
The Trump administration has relaxed privacy requirements for telemedicine, or virtual doctor visits: medical staff treating patients over the phone and using video apps such as FaceTime, Zoom, Skype and Google Hangouts. The move raises the chances that hackers will be able to access patient's highly sensitive medical data, using it, for example, to blackmail the patient into paying a ransom...
Read More
Are Hackers Targeting Your Association? Here’s How to Stop Them.
Are hackers targeting your association? The recent revelation that Chinese hackers penetrated the internal computer network of the National Association of Manufacturers (NAM) last summer should be a clarion call to all associations: They are coming for you. The suspected Chinese hackers ramped up their efforts to steal information in the days surrounding a meeting between NAM President Jay...
Read More
Democracy @ Stake: 2020 Election Interference DejaVu
What you need to know about Russia's 2020 election interference Last week, the director of national Intelligence (DNI), a Republican appointee, notified the House Intelligence Committee that Russia is indisputably tampering with the 2020 election similar to election interference in 2016. The intelligence community determined that Russia's efforts are to help see Trump reelected. Angered by the news, Trump fired...
Read More
Private Eyes Are Watching You: What it Means to Live (and Be Watched) in the Surveillance Economy
What it is the Surveillance Economy How do you feel about the fact that Facebook knows your weight, your height, your blood pressure, the dates of your menstrual cycle, when you have sex and maybe even whether you got pregnant? Even when you’re not on Facebook, the company is still tracking you as you move across the internet. It knows...
Read More
Small Business Cybersecurity: 5 Steps to Stop Cybercrime
Small Business Cybersecurity Gone Terribly Wrong On August 12, 2003, as I was just sitting down to a tea party with my daughters and their stuffed animals, the doorbell rang. Standing there when I opened the door was a special agent from the economic crimes unit at the district attorney's office—ready to charge me for electronically embezzling (hacking) $298,000 from...
Read More
Data Integrity Attacks: How Cybercriminals Manipulate Rather Than Steal Your Info
You're rushed to the hospital after a serious car accident. Doing her job, the admitting physician verifies your blood type prior to giving you a life-saving transfusion. But no one knows the hospital’s medical records have been hacked — but not stolen. In this case, your records have been changed, reflecting a blood type that if transfused, would likely kill...
Read More
The Unlikely Weapon in Cybersecurity: Going Analog
Rule #1: Technology is highly unpredictable when it's new & untested. And even worse when it's insecure. All of us have learned not to count on Technology Version 1.0 in mission critical situations. But it seems that Iowa and Pennsylvania didn't get the memo, which rendered their election results as untrustworthy. Iowa attempted to use a caucus tally app that had very few...
Read More
Top Cybersecurity Trends 2020 & the Perils of Prediction
(i.e., Cybercriminals read the same articles as cybersecurity experts) Oh how we love to predict the future. Who will win the next Super Bowl, Presidential Election, or Best in Show Pooch-a-thon following the Macy’s Day Parade? I’m frequently asked as a cybersecurity expert to peer into my somewhat cloudy crystal ball and give opinions on what cybersecurity trends the...
Read More
Google Isn’t Just Buying Fitbit, They’re Tracking Your Donut Habit
Spinning Wildly on the Hampster Wheel of the Surveillance Economy You’re heading to the gym for a workout when you decide to surprise your coworkers with a treat. You search for the nearest bagel shop on your Google Maps app. The app directs you to their closest advertiser, Donut Feel Good?, which is actually a donut shop just short of...
Read More
Disinformation Campaigns Are Coming for Your Bottom Line
The rise of disinformation campaigns could put the reputation of your company at risk Imagine waking up to find the internet flooded with fake news that one of your products was killing hordes of people or your company had been implicated in a human trafficking ring. Imagine if there was a deepfake video of you or one of your company...
Read More