With “Friends” Like The Saudis, Who Needs Enemies?

Or The Strange Case of Jeff Bezos’ IPhone and the Saudi Crown Prince

The evidence says that the Saudi Arabian Crown Prince, Mohammed bin Salman (aka MBS) engineered a way to hack Jeff Bezos’ cell phone.  Just why MBS would be interested in Jeff, Jeff’s phone, or Jeff’s life is an interesting question, with surprising answers.

It seems that MBS invited Jeff Bezos to a private party, and during the course of the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Anniversary of the dedication of the ENIAC computer in 1946.

ENIAC (/ˈiːniæk,  ˈɛ-/; Electronic Numerical Integrator and Computer) was among the earliest electronic general-purpose computers made. It was Turing-complete, digital and able to solve “a large class of numerical problems” through reprogramming.

ENIAC was completed in 1945 and first put to work for practical purposes on December 10, 1945.  ENIAC was formally dedicated ...

Continue Reading →
0

Infographic – The Internet of Hackable Things in Your Daily Life

Today I share an infographic provided by repeat guest poster Siege Media.  The Internet of Things is full of cool new devices that connect to the network and Internet, and can be used from distant locations.  But if used without proper security controls, these smart devices can provide an easy remote entry point for an attacker.

I have not republished the excellent article that was part of the original post, 

Continue Reading →
1

WyzGuys Has A New Training Partner

WYZGUYS CYBERSECURITY, A DIVISION OF WYZCO GROUP INC, NOW OFFERS EMERGING TECH TRAINING AS AN AUTHORIZED TRAINING PARTNER WITH CERTNEXUS

Rochester, New York – December 2019 – WyzCo Group Inc, a leading provider of instructor-led IT Certification Training, announces the addition of in-demand emerging technology certifications and micro-credentials to their public training schedule thanks to their new partnership with CertNexus.

As companies navigate within the fourth Industrial Revolution, multi-vendor and open source solutions are the norm to provide best in ...

Continue Reading →
0

Sunday Funnies – Cold War Remnants

The Cold War ran from 1947 to 1991, and rarely saw actual combat between the two super powers:  the United States with its NATO allies, and the Soviet Union (USSR) and the Warsaw Pact nations of the Eastern Bloc.  Some of the main battles between these two sides were in Korea and Vietnam.  But there were plenty of other ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


‘Was the Iowa Caucus Hacked?’

People Are Searching for Answers
After a night of confusion and uncertainty in which no results were reported for the Iowa Democratic caucus, people are searching for answers. As a cybersecurity journalist, I probably consider the hacking possibilities more than most, but it was hard not to wonder. Adding to the fire ...

Continue Reading →
0
Page 1 of 176 12345...»