The Winter Olympics in Pyeongchang, South Korea start next month and hackers are using the pretext of the games to launch phishing attacks featuring custom malware that, if downloaded, allows an attacker to take control of a device.... Read More
While there are a thousand resolution-worthy action items out there, the time is always now for the things that need to change in our lives. Never were truer words spoken when it comes to our potential vulnerability to hackers.
The number of breaches and the granular nature of the data exposed in those attacks over the past year are both unprecedented. The Equifax breach alone included...Read More
Scammers make a killing during the holiday season. While you spend your time thinking of ways to bring holiday joy to others, they spend their time thinking up ways to steal from you. The saddest part about this is that the ghosts of Christmases past keep visiting Christmas present.
With that, I give you this year’s 12 scams of Christmas.The Gift Card Scam
While definitely a ghost of...Read More
The Supreme Court is hearing a case this month, Carpenter v. the United States, that represents an opportunity for the country to move in the right direction on privacy. It’s only fitting that a conviction for a series of armed robberies involving the theft of smartphones may determine the way investigators and prosecutors can use cellphone data in the future.
Timothy Ivory Carpenter was convicted of planning, supplying guns...Read More
Keeping up with news alerts about cybersecurity flaws in consumer electronics is a lot like picking up spilled jelly beans one at a time with a plumber’s wrench. Even if you figure out how to do it and have endless patience, a few will skitter out of sight.
Assume for the moment that, unlike most people, you think a lot about cybersecurity and you do your homework before buying a connected device. (I know. This is a truly...Read More
How would you feel if the digital “you” were deleted? The common wisdom in cybersecurity circles is that if you think it can’t happen to you, it probably will. Consider Mat Honan’s story.
“First my Google account was taken over, then deleted,” Honan wrote. “Next my Twitter account was compromised, and used as a platform to...Read More
If a shady looking character told you to give him pictures of yourself naked, would you? How about a video? What if he told you that it was for your own good? Even if you have less sense than one of the rocks in Kim Jong-un’s head, you wouldn’t do it.
Now what if Facebook asked you for nudes? According to The Verge, the social media...Read More
Did members of the royal family go under the knife at an upscale London plastic surgery clinic? A recent hack at London Bridge Plastic Surgery may reveal the answer to that—and many other questions you never thought to ask.
Setting aside the obvious follow-up questions (Do you care? Is it any of your...Read More