Cyber Thieves Cut Both Ways Identity theft was the 2nd most common complaint that the FTC (Federal Trade Commission) received in 2015. And unfortunately, identify theft is only getting worse. Consumers spend more money on computer security, and I commend this, but what they fail to recognize is that cyber thieves are also common criminals that often stoop… Read More »
Top Security Features Apple Announced at WWDC
Top Security Features Apple Announced at WWDC Amidst hundreds of new iOS, watchOS, tvOS and macOS features announced, it was the security ones that told Apple’s story best to me. Apple’s narrative as the security and privacy-focused company continues to solidify. In the same way that Google cannot suddenly stop tracking our search and email… Read More »
Is the Internet of Things a scary proposition for organizations?
The Internet of Things (IoT) is poised to be the ultimate technology disrupter. Companies are racing to build out Internet of Things businesses, but security is not at the top of the list. When security is considered low priority within any organization, the hairs on the back of my neck stand up. And security is… Read More »
How Easy Is It For Hackers To Jack The Tower?
Earlier this month the Government Accountability Office issued a 46-page report outlining security vulnerabilities in critical Federal Aviation Administration (FAA) systems. The report concerns the national airspace system (NAS) used to track and direct public and private aircraft. Many of these issues are common in all types of organizations, so look over the FAA’s list of… Read More »
The Hidden Privacy Upside of Net Neutrality
On February 26th the Federal Communications Commission voted in favor of stronger net neutrality rules. The vote reclassifies both wired and wireless broadband internet service providers (ISPs) as utilities under Title II of the Communications Act of 1934. Most of the media attention has focused on the ruling barring ISPs from blocking or prioritizing… Read More »
How Can We Prevent The Next White House Drone Crash?
Current Federal Aviation Administration regulations require civilian drones to stay under 400 feet in altitude and at least five miles from airports and other restricted areas. Unfortunately, not all drone operators follow the regulations. Drones at the White House On Monday, January 26th at 3:02 AM a Secret Service officer on duty at the White House… Read More »
My Phone Is Held Hostage By Ransomware, Now What?
Ransomware is a type of malware that holds your data hostage. It has been a problem with computers for many years, but it’s only recently started showing up on mobile devices. When you activate the program or app, it blocks you from accessing the data on the device and displays a message demanding payment by… Read More »