People assume that staying safe from cyber hackers requires a lot of money. While spending money in the right area is important, common sense features costing little to no money and are the most effective defenses to thwart a cyber attack. Let’s face it, no one is 100% safe from cyber hackers so each of us… Read More »
Billions of Bluetooth Devices Are Contagious With Malware – Make Sure You Aren’t the Next Victim
More than 8.2 billion devices use Bluetooth. Most of our Internet of Things (IoT) devices employ Bluetooth to connect and communicate with each other. In fact, most computers have Bluetooth capability as well. This includes your laptop, tablet, smartphone, smart TV, home alarm system, garage door, smart car, smart refrigerator, keyboard, mouse, speakers, baby monitor,… Read More »
Hoarding Vulnerabilities Makes Me ‘WannaCry’
Hoarding is when an individual has difficulty parting with or discarding possessions regardless of their value. But most hoarders eventually have their day of reckoning when their world implodes and their behavior affects not just themselves, but family and friends. Hoarding security vulnerabilities has similar parallels but on a scale affecting potentially billions of innocent users. In a… Read More »
Hackers Are In Love With My Printer (part 2)
Last week, I wrote about how weak printer security remains in general. I included a few tips but I do not know if the message got through. Users still tend to think of printers as dumb USB or wireless devices. Modern printers are powerful computers in their own right and when you connect that to… Read More »
Top 6 Tips To Avoid Email Phishing Scams
Top 6 Tips To Avoid Email Phishing Scams Phishing attacks cost companies $5 Billion dollars globally last year. According to the Wombat 2016 State of the Phish, 85% of all organizations suffered phishing attacks last year with no signs of slowing. So how can you avoid getting netted in 2017? I have a your top 6 tips to stay safe but… Read More »
IoT: 21st Century Trojan Horse
When ancient Greeks left a giant horse bestowed upon the Trojans but secretly filled with Greek soldiers, they couldn’t have imagined their plan being re-enacted some 3000+ years later. On October 21st something along the same lines occurred, this time effecting hundreds of thousands of unsecured IoT devices used to facilitate massive DDoS (Distributed Denial of Service)… Read More »
Can Pokemon and Security Co-exist?
Can Pokemon and Security Co-exist? Pokemon Go is the digital scavenger hunt we all wanted growing up and now kids and adults alike are experiencing that and getting some exercise as well. So what’s the harm? Like any massively successful online game, Pokemon Go involves millions of players and their data. This is no different… Read More »
IoT Hackers Are Just High-Tech Cat Burglars
Keeping our families and homes safe is essential in this uncertain world we live in. I often find myself double checking my deadbolt, alarm, and lights before I leave home. Yes, I am one of those paranoid home owners that put the alarm stickers on every window, and of course, I make sure no newspapers… Read More »