
Cryptocurrencies & Cybercrime
Cryptocurrencies have dropped in popularity and value but cybercriminals continue undeterred. The latest on cybercrime and cryptocurrency...
Cryptocurrencies have dropped in popularity and value but cybercriminals continue undeterred. The latest on cybercrime and cryptocurrency...
Facebook continues to do anything they can to build data profiles on users. This week it was revealed that they shifted their Onavo efforts to a new "research" project where they targeted 13-35 year olds via 3rd party market research companies. Lots of questions and issues here...
GDPR has been in effect for a few months and we're starting to see the first major rulings. Google was just hit with a 50m Euro fine for not being clear enough in their intentions with user data. Is this a turning point? While regulation and legislation is typically followed to the letter, t
The 10 Year Challenge is sweeping social media right now. It's a harmless way of looking back at yourself—and everyone else—a decade ago...or is it?
Network security is struggling to keep up with the reality of how organizations are build and connect today. From hybrid network (on-premises and in the cloud) to large mobile user bases, traditional network security—push everything through a choke point—is well past it's best before date. Wh
It's not uncommon for cybercriminals to combine multiple data sets in order to increase their chances of finding valid user credentials. Security researcher Troy Hunt found the mother of all collections, dubbed "Collection #1". This roll up contains 773M sets of credentials fro
Data is extremely valuable. We've seen that with data brokers, social media giants, and almost every company out there. The current attitude is to gather all the data possible, save it forever, and monetize it later on.
Three articles this week each touching on smartphone data highlight a much bigger issue. Each of these articles remind us how much data our phones generate and how valuable that data is. Yet we don't treat that data as valuable. It's packaged and resold with no compensation to the owner
150th episode! As I wind down for the year, I always try to look back at what has worked and what hasn't. This show has evolved from a simple "get some ideas out there" to a regular view on how security privacy impacts our technology and our communities.
Names matter. They help a community come together around a singular concepts. But what happens when definitions and usage differ?
Sometimes things don't go as expected. That can be frustrating and unfortunate...but also an opportunity to learn.