BVS CEO & Cyber Security Expert, Scott Schober provides security details on Inside Edition Last week’s leak of confidential celebrity photos has focused renewed public attention on the security risks of storing data in the cloud. The photos were originally posted on a seedy Internet site by an anonymous user, then reposted to other disreputable… Read More »
Top 4 Security Drawbacks of BYOD
BYOD Security Concerns Many organizations have allowed or encouraged employees to use their own smartphones and tablets on the job. The process is called bring your own device, or BYOD. It’s popular with workers and saves the employer money on equipment costs. However, BYOD has drawbacks that concern security experts. Last week the Information Security… Read More »
Wiping Your Old Android Device Isn’t Enough
The average user’s upgrade cycle for smartphones and tablets is around two years. If the old device is still in good shape once the user upgrades, individual users and small businesses usually sell it or pass it along to someone else. Big companies send obsolete devices to companies that specialize in recycling end-of-life electronics.… Read More »
TSA Bars Dead Electronics from Certain Incoming International Flights
On July 6th the United States Transportation Safety Administration announced passengers flying into the U.S. from Europe and the Middle East will soon have to power on their cell phones and other electronic devices. If the device will not power on, it won’t be allowed on the plane. The TSA has required international passengers to… Read More »
Safeguarding Digital Evidence on Wireless Devices
On June 25th, the US Supreme Court struck a blow for digital privacy rights by ruling that in most cases police must get a search warrant before searching a suspect’s cell phone. The court ruled unanimously on two separate cases, one involving a feature phone and the other a smartphone. There’s no question any cell… Read More »
Kidnapping Orchestrated by Inmate With Cell Phone
It seems every week there’s a story in the news about the number of cell phones confiscated from prison inmates. A recent incident in the American south provides a dramatic illustration why correctional facilities cannot afford to allow this problem to continue. In 2012, a North Carolina gang member with a long history of violent… Read More »
Think only the military has drones? Think again.
Just a few years ago, only militaries and government agencies had access to sophisticated drones, but today anyone can buy them for just a few hundred dollars. The basic hardware has been around for decades in the form of remote-controlled helicopters. Today drone operators can equip them with high-definition cameras, Wi-Fi detection tools and other… Read More »
4 Simple Ways to Keep Your Business Secrets Safe
Governments have been using cyber espionage to spy on one another almost as long as the Internet has been around. Likewise, cyber crime is nothing new. Until relatively recently, the two were distinct. Governments stole military secrets from other governments, and criminals stole money from banks and private enterprises. Now the two have come together.… Read More »