As a family man and business owner, I try to look for the good in all people but as a cybersecurity expert and author, it’s sometimes hard to find that good. So when Bob Schiff, founder and CEO at Cyberlitica and colleague of mine offered to share some screen shots with me, I felt like… Read More »
Gift ‘Carding’ Not as Nice as Sounds
What do you get for the person that has everything? Gift cards, while impersonal, do make gifting easy for those of us that are too busy or disinclined to search for that perfect gift. Hackers have gotten into the act of ‘carding’ but not like you think. What is Carding? Carding is when a stolen… Read More »
What’s In Your Cryptocurrency Wallet?
The Dark Web has been called a digital black market because that is exactly what is has become over the past few years. Websites and marketplaces on the Dark Web hide their owner’s identity and location using the Tor encryption tool. Also, every black market needs a currency that is easy to move around and hard… Read More »
Breach Recovery Checklist For You and Your Company
No business nor individual is immune to a cyber breach yet I still hear many people telling me they don’t think they will be affected. They believe that their company does not have anything valuable enough to steal, but every company and individual have valuable data to a cyber thief that we might overlook. While… Read More »
Top 6 Tips To Avoid Email Phishing Scams
Top 6 Tips To Avoid Email Phishing Scams Phishing attacks cost companies $5 Billion dollars globally last year. According to the Wombat 2016 State of the Phish, 85% of all organizations suffered phishing attacks last year with no signs of slowing. So how can you avoid getting netted in 2017? I have a your top 6 tips to stay safe but… Read More »
RFID Pickpocketing Debunked
RFID Pickpocketing Debunked Pickpocketing might seem like a crime from centuries past but that doesn’t stop me from checking my wallet periodically when I stroll through crowded areas. As a wireless and cybersecurity expert, paranoia is part of my business but that doesn’t mean we all have to succumb to that psychosis. That’s why I wanted… Read More »
What’s The Best Way To Steal Credit Info? Hack A Credit Processing Company Like Experian
On October 1st T-Mobile released a statement revealing approximately 15 million existing and potential customers had their personal identification data stolen. The hack was not against T-Mobile itself but against Experian, the company that runs credit verification for postpaid accounts for T-Mobile. What Was Stolen? According to T-Mobile, anyone who submitted a credit application between… Read More »
Black Hat Conference Highlights
Last week cyber security experts gathered at the Mandalay Bay hotel in Las Vegas for the 9th annual Black Hat conference. While the major media focus was on the connected car vulnerabilities I discussed in a previous post, there were many other important subjects covered. Let’s look at some of the highlights. Android Fingerprint Sensor… Read More »