MY TAKE: Lessons learned from the summer of script kiddies hacking Twitter, TikTok

Graham Ivan Clark, Onel de Guzman and Michael Calce. These three names will go down in the history of internet commerce, right alongside Jack Dorsey, Mark Zuckerberg and Jeff Bezos.
Related: How ‘Zero Trust’ is compatible with agile computing
We’re … (… Continue reading MY TAKE: Lessons learned from the summer of script kiddies hacking Twitter, TikTok

MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

It took a global pandemic and the death of George Floyd to put deep-seated social inequities, especially systemic racism, front and center for intense public debate.
Related: Will ‘blockchain’ lead to more equitable wealth distribution?
We … Continue reading MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

MY TAKE: Remote classes, mobile computing heighten need for a security culture in K-12 schools

Parents have long held a special duty to protect their school-aged children from bad actors on the Internet.
Related: Mock attacks help schools defend themselves
Now COVID-19 has dramatically and permanently expanded that parental responsibility, as we… Continue reading MY TAKE: Remote classes, mobile computing heighten need for a security culture in K-12 schools

MY TAKE: Technologists, privacy advocates point to flaws in the Apple-Google COVID-19 tracing app

If the devastating health and economic ramifications weren’t enough, individual privacy is also in the throes of being profoundly and permanently disrupted by the coronavirus pandemic. The tech giants are partnering on a tool for public good, but… Continue reading MY TAKE: Technologists, privacy advocates point to flaws in the Apple-Google COVID-19 tracing app

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to connect to the internet we could achieve… Continue reading GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

MY TAKE: Why COVID-19 ‘digital distancing’ is every bit as vital as ‘social distancing’

As coronavirus-themed cyber attacks ramp up, consumers and companies must practice digital distancing to keep themselves protected.
Related: Coronavirus scams leverage email
As we get deeper into dealing with the coronavirus outbreak, the need for auth… Continue reading MY TAKE: Why COVID-19 ‘digital distancing’ is every bit as vital as ‘social distancing’

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

It’s difficult to convey the scope and scale of cyber attacks that take place on a daily basis, much less connect the dots between them.
Related: The Golden Age of cyber spying
A new book by Dr. Chase Cunningham —  … (more…… Continue reading SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

Application programming interface. API. It’s the glue holding digital transformation together.
Related: A primer on ‘credential stuffing’
APIs are the conduits for moving data to-and-fro in our digitally transformed world. APIs are li… Continue reading SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

BEST PRACTICES: Mock attacks help local agencies, schools prepare for targeted cyber scams

Cyber criminals who specialize in plundering local governments and school districts are in their heyday.
Related: How ransomware became a scourge
Ransomware attacks and email fraud have spiked to record levels across the U.S. in each of the past &#8230… Continue reading BEST PRACTICES: Mock attacks help local agencies, schools prepare for targeted cyber scams

SHARED INTEL: Bogus Coronavirus email alerts underscore risk posed by weaponized email

It comes as no surprise that top cyber crime rings immediately pounced on the Coronavirus outbreak to spread a potent strain of malware via malicious email and web links.
Related: Credential stuffing fuels cyber fraud
IBM X-Force researchers shared det… Continue reading SHARED INTEL: Bogus Coronavirus email alerts underscore risk posed by weaponized email