Email Security Beyond the Soundbite The ubiquity of smart phones and their apps have reduced the attention span for the masses. People now expect their information in big fonts, nice colors, and pretty pictures.
Whaling is Flourishing, A $5 Billion Hacker Lottery Harpooning whales is (in most of the world) a thing of the past. This is good for the kind-hearted. But in the cyber world, harpooning “whales” is a thriving and fantastically profitable criminal profession.
Recent reports of the amazing eavesdropping power and home control Amazon’s Alexa has (similar to other voice-assistances) should not surprise. Its inherent in how these virtual assistants work.
Today’s Fake News will be “Quaint” by 2020 Turning the power of connectivity against itself, fake Facebook and other social media accounts were able to spew propaganda to millions of targeted individuals who were specifically identified by the capturing of personal data from Facebook apps and Google analytics. Who was responsible? We won’t get involved […]
Is “Security by Obscurity” An Obsolete Concept? The term “security by obscurity” has been around for a long time. Traditionally, this has referred to the idea that the best way to keep a system safe is to keep its design (and any potential vulnerabilities) a secret. To many, “security by obscurity” has also represented the […]
April 17, 2025
April 11, 2025
April 04, 2025
March 28, 2025
March 21, 2025