Hoarding is when an individual has difficulty parting with or discarding possessions regardless of their value. But most hoarders eventually have their day of reckoning when their world implodes and their behavior affects not just themselves, but family and friends. Hoarding security vulnerabilities has similar parallels but on a scale affecting potentially billions of innocent users. In a… Read More »
Facebook Buying Stolen Passwords To Fight Hackers
With close to 1.2 billion users, 5 new profiles created every second and average users spending 20 minutes on Facebook alone, it would seem that Facebook would eventually outgrow the number of available of passwords. That assumption couldn’t be further from the truth. What is troubling to cybersecurity experts like myself is that while even 8 character passwords… Read More »
Hackers Are In Love With My Printer
If you’re anything like me, you’ve given up on the idea of a paperless office long ago but that’s okay because I’ve grown accustomed to my printer’s Swiss Army Knife ability to tackle most jobs. My compact printer scans, faxes and prints beautiful documents all from the corner of my desk. And many printer makers… Read More »
Top 6 Tips To Avoid Email Phishing Scams
Top 6 Tips To Avoid Email Phishing Scams Phishing attacks cost companies $5 Billion dollars globally last year. According to the Wombat 2016 State of the Phish, 85% of all organizations suffered phishing attacks last year with no signs of slowing. So how can you avoid getting netted in 2017? I have a your top 6 tips to stay safe but… Read More »
Are All Bug Bounties Created Equal?
Are All Bug Bounties Created Equal? Hiring a professional exterminator can be a costly ordeal and typically requires multiple applications of strong chemicals in your home. They know their bugs and the chemicals and application techniques that are most effective. A typical exterminator treatment falls between $300 and $500 whereas, “cyber exterminators” are paid an average of $294 per reported bug submission… Read More »
IoT Hackers Are Just High-Tech Cat Burglars
Keeping our families and homes safe is essential in this uncertain world we live in. I often find myself double checking my deadbolt, alarm, and lights before I leave home. Yes, I am one of those paranoid home owners that put the alarm stickers on every window, and of course, I make sure no newspapers… Read More »
Is a serial hacker stalking Rutgers University?
Since spring of 2014, Rutgers has been targeted by a hacker or group of hackers in a series of distributed denial of service (DDoS) attacks. A DDoS attack uses a network of compromised computers called a botnet to access the targeted site simultaneously. The increase in traffic overwhelms the targeted network and causes it to… Read More »
How Can Military Drones Be So Vulnerable to Hacking Attacks?
United States military and intelligence agencies are increasingly relying on unmanned aerial vehicles but these military drones have long been an attractive target for hackers. And lately, it seems as though the hackers are gaining entrance more easily. How is this possible? In 2011 a CIA drone was captured by Iranian hackers who managed to… Read More »