Monthly Archives: March 2016

Hillary’s Email was Hacked, but What was the Extent of the Damage?

This is a long and complicated story with many twists and turns, but it all begins shortly after Hillary Clinton became Secretary of State in 2009. According to some sources, Hillary was never really interested in using the government email … Continue reading

Posted in Uncategorized | Tagged , , | 2 Comments

“IT Security’s Weakest Link”: The Endpoint Security Problem

By now, almost everyone knows that the easiest way for a hacker to get into a corporate or institutional network is by compromising one of its endpoints. Endpoints are simply those devices (computers, smartphones, tablets) connected to a network. Cyber … Continue reading

Posted in Uncategorized | Tagged , , , , | 1 Comment

Is Wikipedia on the Brink of Financial Collapse?

If you try to visit Wikipedia, you might see an ad with the following message. (I blurred the currency because it is adapted to your IP address.) My first feeling was that of mild panic. I had no idea Wikipedia … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

The Phantom Identity Menace: How to Detect Hidden Criminals on Your Network

A recent webinar delivered by cyber security firm, Centrify (The Phantom Identity Menace), clearly outlined the threats that modern companies and institutions face from attacks that use compromised identities. Of course, Centrify hopes to interest potential customers in their Centrify Identity … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Snapchat Hacked Again, and This Won’t Be the Last Time

 Snapchat cofounders Evan Spiegel, left, and Bobby Murphy As long as Evan Spiegel maintains control of Snapchat, you can be 100% sure his company will be repeatedly hacked. How can I be so sure? For two simple reasons. First, Spiegel … Continue reading

Posted in Uncategorized | Tagged , , , | 1 Comment