Corporate Leaders Urge Government to Adopt Paradigm-Shifting Security Architecture

“Any Fortune 500 company that has a CIO, ought to have a CSO”, so said the former president of Lockheed Martin and General Motors International Operations, Lou Hughes, in a recent Fox News interview. Hughes’ words should not be taken lightly. Unlike other corporate leaders who routinely pay lip service to cyber security, Hughes has … Continue reading Corporate Leaders Urge Government to Adopt Paradigm-Shifting Security Architecture

Stalkerware: “Even your grandad will be monitoring phones in no time!”

85% of women entering domestic violence shelters say their attackers stalked them using GPS. 75% of them said their stalkers used remote surveillance tools. Brian Spitzberg  found, in one of the largest studies on the subject, that “2–13% of males and 8–32% of females are victimized by stalking at some point in their adult lives, … Continue reading Stalkerware: “Even your grandad will be monitoring phones in no time!”

Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

There are three main reasons for hacking. One is for financial gain, one is for acquiring protected information, and the third is to achieve some political objective. The second reason for hacking, that of acquiring protected information, is often used, at a later time, to achieve financial gain, but its motivation is somewhat different than … Continue reading Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

Gartner Research Adds New Dimension to BYOD Security

Gartner’s Recent webinar presented research which puts BYOD (Bring Your Own Device) security in a completely new light. Gartner presenter, Dionisio Zumerle, began the webinar by defining BYOD from a security point of view: “The practice of deliberately breaching enterprise security by putting sensitive data on an unknown, uncontrolled, untrusted, unmanaged device.” In other words, … Continue reading Gartner Research Adds New Dimension to BYOD Security

Recent Ponemon Institute Study Casts Doubt on the Effectiveness of BYOD Policies

I recently represented InZero Systems at a webinar co-hosted by Larry Ponemon, of the Ponemon Institute, and the security firm, Avecto. The webinar was entitled, Cyber Strategies for Endpoint Defense, and was largely based on the recent report of the same name. The study points out weaknesses in security that can stem from the introduction … Continue reading Recent Ponemon Institute Study Casts Doubt on the Effectiveness of BYOD Policies

It’s Tax Season Again. Time for Hackers to File Your Return

It’s bad enough that you have to do so much work to get your taxes done and, if you’re lucky, file for a refund. But if, after you try to file your return, you get a message that says "The dependent's Social Security number cannot be used more than once in a tax return. It … Continue reading It’s Tax Season Again. Time for Hackers to File Your Return