Top 4 Fraud Threats And Tips To Stay Safe Small business owners and consumers are prime targets for fraudulent activities. We can hope we do not become a victim, but if we get complacent and think “It will never happen to me”, stats show it is only a matter of time. However, if we… Read More »
There’s Only 1 Way To Secure Trump’s Phone
There’s Only 1 Way To Secure Trump’s Phone Smartphone security is a fairly binary process these days. Whether you’re sporting an iPhone, Android or even Blackberry or Windows smartphone, any security expert will tell you that none are 100% secure. This might not be an issue for most of us but what about the leader of the… Read More »
Hackers Are In Love With My Printer (part 2)
Last week, I wrote about how weak printer security remains in general. I included a few tips but I do not know if the message got through. Users still tend to think of printers as dumb USB or wireless devices. Modern printers are powerful computers in their own right and when you connect that to… Read More »
Hackers Are In Love With My Printer
If you’re anything like me, you’ve given up on the idea of a paperless office long ago but that’s okay because I’ve grown accustomed to my printer’s Swiss Army Knife ability to tackle most jobs. My compact printer scans, faxes and prints beautiful documents all from the corner of my desk. And many printer makers… Read More »
Top 6 Tips To Avoid Email Phishing Scams
Top 6 Tips To Avoid Email Phishing Scams Phishing attacks cost companies $5 Billion dollars globally last year. According to the Wombat 2016 State of the Phish, 85% of all organizations suffered phishing attacks last year with no signs of slowing. So how can you avoid getting netted in 2017? I have a your top 6 tips to stay safe but… Read More »
World Of Watson Makes For A Better World
I recently had a chance to interview two experts in their respective fields of cybersecurity, Morgan Wright, an internationally recognized expert on cybersecurity strategy and cyberterrorism enforcement and Shahid Shah, an internationally recognized and influential cybersecurity and risk management expert. Besides both sharing a passion for cybersecurity and its applications in law enforcement, they were also both looking forward… Read More »
Are All Bug Bounties Created Equal?
Are All Bug Bounties Created Equal? Hiring a professional exterminator can be a costly ordeal and typically requires multiple applications of strong chemicals in your home. They know their bugs and the chemicals and application techniques that are most effective. A typical exterminator treatment falls between $300 and $500 whereas, “cyber exterminators” are paid an average of $294 per reported bug submission… Read More »
IoT: 21st Century Trojan Horse
When ancient Greeks left a giant horse bestowed upon the Trojans but secretly filled with Greek soldiers, they couldn’t have imagined their plan being re-enacted some 3000+ years later. On October 21st something along the same lines occurred, this time effecting hundreds of thousands of unsecured IoT devices used to facilitate massive DDoS (Distributed Denial of Service)… Read More »
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- 8
- …
- 20
- Next Page »