by Greg Scott | May 23, 2018 | Cybersecurity, Slice of Life
My friend and fellow author, Ann, and her husband found out one day they were identity theft victims because somebody hundreds of miles away filed a USPS change of address form in their name. It’s mind-boggling that in today’s era of massive data...
by Greg Scott | Feb 17, 2018 | Cybersecurity, Technology
Way back in 2005, some friends and I set up a nonprofit named Operation America Cares. We offered free video services for American families connecting with loved ones serving overseas in the military. I have great memories from that period, but by 2010,...
by Greg Scott | Feb 12, 2018 | Cybersecurity, Technology
Many bloggers and small businesses build websites using service providers such as WordPress or Wix, and friends and family find them using names like mysite.wixsite.com, or mysite.wordpress.com. This is okay for a hobby. But it doesn’t work for anyone trying...
by Greg Scott | Dec 16, 2017 | Cybersecurity
I keep asking myself, why do we still see sensational data breaches almost every week? Are attackers really that much smarter than the good guys? The short answer is, no, they’re not. Attackers win because the good guys do a lousy job of defense. The...
by Greg Scott | Oct 25, 2017 | Cybersecurity
The politicians are at it again. This time, US Deputy Attorney General, Rod Rosenstein, wants tech companies to come up with a concept he calls, “responsible encryption.” I wrote a blog post about government putting its fingers in encryption in early 2016,...
by Greg Scott | Oct 19, 2017 | Cybersecurity
In Mid October, 2017, Mathy Vanhoef set up a website to demonstrate an attack he discovered and named KRACK Attack that rocked the WiFi world. For a security researcher, this was the mother-load. He discovered a flaw in the WPA2 protocol that...
Recent Comments