Apple Inc. is currently cleaning up its iOS App Store to eliminate malicious iPhone and iPad programs recognized in the first extensive attack on the popular software outlet. Usually, these types of…
Stealing Your Money - Sphinx Banking Trojan
A new banking Trojan called Sphinx has surfaced in the criminal underground. Sphinx is said to be based on the source code of the notorious Zeus banking malware. Zeus, also known as Zbot, is a…
U.S. Officials Praise Chinese Hackers
Intelligence Officials discuss growing threats of cyberattacks On September 10, 2015 a gathering of the nation’s top intelligence officials convened on Capitol Hill to discuss worldwide cybersecurity…
LifeLock: 100% Not Guaranteed
Do you recall those eye catching ads for LifeLock? You know, the ones where CEO Todd Davis publishes his own Social Security number on the side of a truck and dares anyone to steal his identity? Of…
The Federal Trade Commission - Enforcing the Next Generation of Cybersecurity
The Federal Trade Commission (FTC) has made ground breaking progress in the war on cybercrime, which means the distinction between the real and digital realm is now so fuzzy that the same law can be…
Next on the Hacker Horizon - Your CAR!
In what seems to be a never ending cycle, another security threat needs to be brought to the public's attention. This summer, several threats have been posed to the automotive industry. So much so…
How to be a Hacker
You may have noticed recently there has been an explosion in cybercrime. I could write up a very long list of notable organizations that have, in the past two years alone, been victims of cyber…
Pick up the phone! $2.5 million dollars is on the line!
I received a call last week that originated from the small island nation of Jamaica. Normally I have a policy of not answering numbers that are not in my contact list, but I made an exception for…
The Wild West Returns - Why We Need John Wayne and His Partner Carbon Black
In an interview this month, Secretary of State John Kerry described the current state of cybersecurity as being “…pretty much the wild west, so to speak…”. This statement is somewhat shocking, coming…