Blog

December 7, 2017
Comments [0]

The Supreme Court is hearing a case this month, Carpenter v. the United States, that represents an opportunity for the country to move in the right direction on privacy. It’s only fitting that a conviction for a series of armed robberies involving the theft of smartphones may determine the way investigators and prosecutors can use cellphone data in the future.

Timothy Ivory Carpenter was convicted of planning, supplying guns...

Read More
December 4, 2017
Comments [0]

News that Uber got hacked and 57 million records were compromised may not seem like an overt threat after this year’s constant mega breaches—but it is. A recent studysuggests that even something as “harmless” as a breach involving names, phone numbers, and email addresses can...

Read More
November 27, 2017
Comments [0]

Keeping up with news alerts about cybersecurity flaws in consumer electronics is a lot like picking up spilled jelly beans one at a time with a plumber’s wrench. Even if you figure out how to do it and have endless patience, a few will skitter out of sight.

Assume for the moment that, unlike most people, you think a lot about cybersecurity and you do your homework before buying a connected device. (I know. This is a truly...

Read More
November 17, 2017
Comments [0]

How would you feel if the digital “you” were deleted? The common wisdom in cybersecurity circles is that if you think it can’t happen to you, it probably will. Consider Mat Honan’s story.

“First my Google account was taken over, then deleted,” Honan wrote. “Next my Twitter account was compromised, and used as a platform to...

Read More
November 13, 2017
Comments [0]

A recent Google study found that phishing exploits are far more likely to be the cause of account takeovers than the information compromised by data breach or malware.

The study, “Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials...

Read More
November 10, 2017
Comments [0]

If a shady looking character told you to give him pictures of yourself naked, would you? How about a video? What if he told you that it was for your own good? Even if you have less sense than one of the rocks in Kim Jong-un’s head, you wouldn’t do it.

Now what if Facebook asked you for nudes? According to The Verge, the social media...

Read More
November 3, 2017
Comments [0]

Did members of the royal family go under the knife at an upscale London plastic surgery clinic? A recent hack at London Bridge Plastic Surgery may reveal the answer to that—and many other questions you never thought to ask.

Setting aside the obvious follow-up questions (Do you care? Is it any of your...

Read More
October 30, 2017
Comments [0]

The odds you don’t know already know about Apple’s latest attempt at market domination — the iPhone X — are about even with the possibility that President Trump will stop using hand gestures when explaining something. That said, it is quite possible that you have not yet heard why the iPhone X should worry you.

“In its continuing war on inconvenience,” Andy Greenberg of ...

Read More
October 24, 2017
Comments [0]

Spam is supposed to be a thing of the past, but it’s not—and today it comes weaponized with manifold data-grabbing threats—from ransomware to keystroke recorders and beyond. Your email has never been more dangerous.

There was a time in the early 2000s when email spam and malicious botnets were viewed as mere nuisances. A confident Bill Gates waved it away at the 2004 World Economic Forum in Davos, Switzerland: “Two years from...

Read More
October 13, 2017
Comments [0]

The number of Internet of Things (IoT) devices in use is forecasted to hit 8.4 billion this year. That’s more than the human population on planet Earth. And with successful attacks like Mirai (which was the malware used in the 2016 Dyn cyberattack) already a part of the IoT story, there’s plenty to worry about.

...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started