by Greg Scott | Feb 12, 2018 | Cybersecurity, Technology
Many bloggers and small businesses build websites using service providers such as WordPress or Wix, and friends and family find them using names like mysite.wixsite.com, or mysite.wordpress.com. This is okay for a hobby. But it doesn’t work for anyone trying...
by Greg Scott | Dec 16, 2017 | Cybersecurity
I keep asking myself, why do we still see sensational data breaches almost every week? Are attackers really that much smarter than the good guys? The short answer is, no, they’re not. Attackers win because the good guys do a lousy job of defense. The...
by Greg Scott | Oct 25, 2017 | Cybersecurity
The politicians are at it again. This time, US Deputy Attorney General, Rod Rosenstein, wants tech companies to come up with a concept he calls, “responsible encryption.” I wrote a blog post about government putting its fingers in encryption in early 2016,...
by Greg Scott | Oct 19, 2017 | Cybersecurity
In Mid October, 2017, Mathy Vanhoef set up a website to demonstrate an attack he discovered and named KRACK Attack that rocked the WiFi world. For a security researcher, this was the mother-load. He discovered a flaw in the WPA2 protocol that...
by Greg Scott | Oct 7, 2017 | Cybersecurity
I’ve tried and failed to convince more people than I can remember why they should care about Internet security. Typical responses include eye rolls, yawns, looking at their watch, and taking “important” cell phone calls. Yes, I do notice. As an IT...
by Greg Scott | Sep 19, 2017 | Cybersecurity
Update Sept. 26, 2017 I put together three video presentations about what went wrong with the Equifax fiasco and what to do about it. Here is a video presentation about what went wrong. Here is a video presentation with a structural approach to fixing the system. Here...
Recent Comments