I recently had a chance to interview two experts in their respective fields of cybersecurity, Morgan Wright, an internationally recognized expert on cybersecurity strategy and cyberterrorism enforcement and Shahid Shah, an internationally recognized and influential cybersecurity and risk management expert. Besides both sharing a passion for cybersecurity and its applications in law enforcement, they were also both looking forward… Read More »
Are All Bug Bounties Created Equal?
Are All Bug Bounties Created Equal? Hiring a professional exterminator can be a costly ordeal and typically requires multiple applications of strong chemicals in your home. They know their bugs and the chemicals and application techniques that are most effective. A typical exterminator treatment falls between $300 and $500 whereas, “cyber exterminators” are paid an average of $294 per reported bug submission… Read More »
IoT: 21st Century Trojan Horse
When ancient Greeks left a giant horse bestowed upon the Trojans but secretly filled with Greek soldiers, they couldn’t have imagined their plan being re-enacted some 3000+ years later. On October 21st something along the same lines occurred, this time effecting hundreds of thousands of unsecured IoT devices used to facilitate massive DDoS (Distributed Denial of Service)… Read More »
#NoteGate is a Thing. Deal with it, Samsung.
#NoteGate is a Thing. Deal with it, Samsung. During a recent business flight to the west coast, I was surprised to learn that all passengers were informed to completely turn off there Galaxy Note 7 phones for the duration of the flight if they had one. I had heard about the stories of new Galaxy Note 7s catching fire but didn’t realize… Read More »
Cyber Thieves Cut Both Ways
Cyber Thieves Cut Both Ways Identity theft was the 2nd most common complaint that the FTC (Federal Trade Commission) received in 2015. And unfortunately, identify theft is only getting worse. Consumers spend more money on computer security, and I commend this, but what they fail to recognize is that cyber thieves are also common criminals that often stoop… Read More »
Yahacked: Biggest hack in history
Yahacked!: Biggest hack in history One of the original Internet darlings, Yahoo, has had a rough decade. After many stalled buyout attempts and further devaluations thanks to lackluster IPs like Tumblr, Yahoo has finally regained stability as part of a $4.8 billion purchase by Verizon…until now. Of what is believed to be the largest breach in history, Yahoo has… Read More »
Brand Hacking: The Sting of a Cyber-breach
Brand Hacking: The Sting of a Cyber-breach Brand is a powerful thing. When consumers buy something from a company, they are paying for the image and brand as much as the product itself. Trillions of dollars are spent every year in sales and marketing efforts to create effective brands that sell. This cannot happen overnight… Read More »
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- 9
- …
- 20
- Next Page »