Amazon Sidewalk, Apple AirTag and Involuntary Sharing

If you own an Amazon device (Ring, Echo, Dot, Plus, Show, Spot, Studio, Input or Flex) then starting this week, you may be sharing at least some attributes of your device with other Amazon device users. To create the kind of ubiquitous mesh network th… Continue reading Amazon Sidewalk, Apple AirTag and Involuntary Sharing

Cybersecurity & Coronavirus: Protecting Customers at Home

During these challenging times, when everyone is working, studying, and streaming from home, securing the home network is more important than ever.   I’m co-producing a webinar about this, where you can learn more about the growing threat la… Continue reading Cybersecurity & Coronavirus: Protecting Customers at Home

Why CSPs Should Care About Phishing

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to do with their illicit efforts what th… Continue reading Why CSPs Should Care About Phishing

Silex Malware: Deadly New Virus Bricks 1000s of IoT Devices

Your IoT’s not sick – Someone just turned it into a brick! A 14-year-old hacker created a new strain of malware called “Silex malware” which bricked over 4000 IoT devices in the span of a few hours.   Once again, the w… Continue reading Silex Malware: Deadly New Virus Bricks 1000s of IoT Devices

Brute Force Attacks on IoT – Here to Stay?

IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, these devices are notor… Continue reading Brute Force Attacks on IoT – Here to Stay?

10 Ransomware Attacks You Should Know About in 2019

Ransomware was deemed one of the biggest malware threats of 2018, and it continues to disrupt the operations of businesses and the daily lives of individuals all over the world in 2019. The 2019 ransomware landscape is quite diverse – security re… Continue reading 10 Ransomware Attacks You Should Know About in 2019

5 Key Takeaways from #MWC19

MWC went by so fast that you may have missed some of the highlights. Luckily, we’ve compiled the following takeaways from the Barcelona conference.  With apologies to Don Adams, it really is time to Get Smart! From Smart Cities and Smart Hom… Continue reading 5 Key Takeaways from #MWC19

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in rever… Continue reading Home Digital Asset Security

5G: Big CSP “Security as a Service” Opportunity

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and dynamic network slicing capabil… Continue reading 5G: Big CSP “Security as a Service” Opportunity

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us … Continue reading Home Router…, or Trojan Horse?