Privacy: When the Application Exceeds its Brief

The recent imbroglio surrounding Facebook and its Android application exceeding its brief caught the attention of all users. In other words, the application was requesting access to information on your device that really wasn’t necessary for the appli… Continue reading Privacy: When the Application Exceeds its Brief

When Scammers Fill the Tech Support Void

Who hasn’t spent an hour or two searching for the contact information for tech support for an app or website we use regularly? We all have. I still haven’t figured out why those companies that provide tech support tend to hide the connectivity to thes… Continue reading When Scammers Fill the Tech Support Void

Zuckerberg Unveils the Cyber-Naivete of Congress

The 10-plus hours of Q&A between Facebook CEO Mark Zuckerberg and members of both houses of congress on April 10 and 11 was, in a word, painful. Agonizingly painful, as we watched one senator and congressman/congresswoman after the other demonstra… Continue reading Zuckerberg Unveils the Cyber-Naivete of Congress

Do Cybercriminals Ever Get Extradited?

Crime across the internet knows no boundaries, yet cybercriminals initiate their act from a physical location within the geographic boundaries of some nation. Therefore, it stands to reason that victims and law enforcement both have a need to identify… Continue reading Do Cybercriminals Ever Get Extradited?

Foreign or Domestic: Does It Matter Where Your Technology is Made?

“What’s under the hood?” is a question normally associated with the automotive industry, but of late it has woven its way into the national security discussion in the United States, associated with foreign made goods and services. Sometimes the questi… Continue reading Foreign or Domestic: Does It Matter Where Your Technology is Made?

Employee Convenience Trumps InfoSec

We are all familiar with the refrain that compliance does not equal security; well, neither does employee convenience. To be sure, any who have been in the workforce for more than a year or two have come across information technology (IT) teams that ha… Continue reading Employee Convenience Trumps InfoSec

U.S. Infrastructure Vulnerable to Russia (and Others)?

The U.S. Cyber Emergency Response Team (US-CERT) issued an alert March 15, “Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors” – Alert TA18-074A. It wasn’t necessarily an ah-ha moment for those in the i… Continue reading U.S. Infrastructure Vulnerable to Russia (and Others)?

Nation State Cyberespionage: Iran and North Korea

The nation state threat posed by Iran and North Korea is very real. Both have evolved into formidable adversaries for both government and industry. When confronted with the knowledge that either of these country’s intelligence apparatus has their cros… Continue reading Nation State Cyberespionage: Iran and North Korea

Nation State Cyberespionage: Russia and China

Is there anyone who believes the internet is not used for cyberespionage? The world of espionage has been ensconced within the internet seemingly since the first packet was sent via the ARPANET some 45-plus years ago, as the concept of packet switchin… Continue reading Nation State Cyberespionage: Russia and China