The destruction of the hurricane itself, and the subsequent flooding that put most of New Orleans underwater knocked many businesses out of commission—and more than a few completely out of existence. Thankfully, we have learned a lot of hard lessons in the wake of Hurricane Katrina that businesses can use to be better-prepared for the next major disaster.
Tony Bradley |
28 Aug |
Read more
Something you know is the least secure method of authentication and the easiest to crack or compromise. It's time to stop relying on something you know for secure authentication.
Tony Bradley |
27 Aug |
Read more
Some are freaking out over Windows 10 privacy settings but Microsoft is not "Big Brother" and the features and services that make Windows 10 great require some tradeoffs of privacy for functionality.
Tony Bradley |
24 Aug |
Read more
Businesses have been diligently working to defend against attacks and exploits for years. The problem is that much of the conventional wisdom about security is reactive and most of the security tools available are only effective against known threats. The rise over the last year or so in targeted zero day attacks has left many organizations feeling defenseless and concerned.
Tony Bradley |
04 Jun |
Read more
A controversy has erupted over claims that a security researcher hacked the avionics systems of a commercial airline through its in-flight entertainment system. Many security experts dismiss the story as simply ludicrous, but some believe it’s possible—and that is cause for very serious concern.
Tony Bradley |
22 May |
Read more
You don't have to be a celebrity to get nailed by a nude photo. According to a report by Trend Micro, sextortion--the use of compromising photos or videos to extract money from victims--is on the rise.
Tony Bradley |
08 Apr |
Read more
All malware is bad, but ransomware is particularly insidious--ask any ransomware victim. That's why a new attack scheme called "Pacman" has raised alarms, because it's even nastier than usual. Think of the classic Pac-Man game's voracious yellow ball, chomping up all of your files. It takes only one click to infect a vulnerable PC, and the attack gives victims only 24 hours to pay the ransom in Bitcoins or risk losing all of the compromised data.
Tony Bradley |
04 Apr |
Read more
This app could save your older Android phone from being hijacked. Specifically, the Installer Hijacking Scanner app from the Google Play store is designed to check for a vulnerability that was discovered over a year ago and still hasn't been resolved.
Tony Bradley |
26 Mar |
Read more
March Madness has begun for NCAA basketball teams--and for cybercriminals, who are getting ready for some games of their own. The extreme popularity of March Madness makes the event a prime target for phishing scams, malware exploits and other cyber attacks.
Tony Bradley |
21 Mar |
Read more
Hillary Clinton is learning good BYOD policy the hard way. The former First Lady, Senator and Secretary of State (and presumptive Democratic front-runner for President in 2016) is taking heat for using her personal email server for State Department business during her tenure in that post--and possibly deleting official emails in the name of her privacy.
Tony Bradley |
14 Mar |
Read more
Wordpress is one of the most popular Web publishing platforms. The vast catalog of plugins is part of what makes Wordpress so powerful, but it can also be the Achilles heel. According to security researchers at Sucuri there are a million-plus Wordpress sites exposed to serious risk, thanks to a flaw in the WP-Slimstat plugin.
Tony Bradley |
27 Feb |
Read more
We're conditioned almost constantly to protect our passwords. Don't write them down. Don't store them in a Word doc on your desktop. Don't share your password over the phone or by email. Don't ever give your password to anyone under any circumstances. The gray area comes with whether to share your password with significant others.
Tony Bradley |
18 Feb |
Read more
It's tax season! You might not want to put off filing your taxes this year. If you're not quick, you might find that someone else has already filed a fraudulent tax return in your name.
Tony Bradley |
14 Feb |
Read more
Anthem customers, we feel your pain. The Anthem data breach revealed last week could affect up to 80 million people, and the investigation into the scope of the crime is just starting.
Tony Bradley |
11 Feb |
Read more
Cyber criminals are always looking for vulnerabilities, and in this case, it's parental instinct. A new phishing scam is disguised as an alert to child sexual predators.
Tony Bradley |
07 Feb |
Read more