Archive for the ‘Cybersecurity – cybercrime’ Category

About the hyperventilation over Russia…

June 1, 2017

Some key points are being overlooked.

=====

Fueled by rumors and “secret intel assessment”, election-deniers are having a field day blaming Queen Hillary’s loss on the Russians and alleging that Trump is in Putin’s back pocket.

Beyond the hypocrisy of the Dems hissy fit over Trump’s  refusal (in debate #3) to commit to accepting the election results if they seemed tainted (<= ironic, isn’t it?), the deniers seem to be overlooking a couple of key points.

(more…)

About the alleged Russian email hack …

December 19, 2016

Some key points are being overlooked.

=====

Fueled by a “secret CIA assessment”, election-deniers are having a field day blaming Queen Hillary’s loss on the Russians.

clip_image001

Beyond the hypocrisy of their post-debate-3 hyperventilation over Trump’s refusal to commit to accepting the election results if they seemed tainted, the deniers seem to be overlooking a couple of key points.

(more…)

Cellphones: “Biggest threat to your cybersecurity”

February 23, 2016

We’re not talking Apple building a backdoor to access your encrypted info, we’re talking ordinary old cyber-criminals intercepting messages, seizing account numbers and passwords, and taking remote control of cell phones.

image

According to Knowledge @ Wharton

By 2015, more Americans are expected to access the Internet through a mobile device than a PC.

And,  45% of surveyed users do not see cybersecurity on their mobile devices as a threat in the same way as they see it on their computers.

The 55% couldn’t be more wrong.

Here’s why …

(more…)

Cellphones: “Biggest threat to your cybersecurity”

May 22, 2015

We’re not talking NSA tracking, we’re talking ordinary old cyber-criminals intercepting messages, seizing account numbers and passwords, and taking remote control of cell phones.

image

According to Knowledge @ Wharton

Nowadays, more Americans are expected to access the Internet through a mobile device than a PC.

And,  45% of surveyed users do not see cybersecurity on their mobile devices as a threat in the same way as they see it on their computers.

The 55% couldn’t be more wrong.

Here’s why …

(more…)

Hacked: What I learned when I was credit hacked …

July 1, 2014

Last year around this time, I told the said story about how some bad guys tried to steal my identity and open up credit cards and car loans in my name.

Bottom line: An ordeal that burned up a bunch of my time and caused plenty of angst … but, no serious damage (that I know of).

A friend just got had his identity hacked.  Somebody filed an IRS 1040 under his name and social security number, hoping to bag a refund check.  Fortunately, the IRS flagged the return as suspicious and didn’t pay-off against the fraudulent return.

 

image

 

Now, as a public service, here’s what I learned that may help you …

(more…)

Hacked: What I learned when I was credit hacked …

August 1, 2013

Yesterday, I told the said story about how some bad guys tried to steal my identity and open up credit cards and car loans in my name.

Bottom line: An ordeal that burned up a bunch of my time and caused plenty of angst … but, no serious damage (that I know of).

 

image

 

Now, as a public service, here’s what I learned that may help you …

(more…)

Hacked: “Criminals huddled over computers all over the world.”

July 30, 2013

This is going to be “hacked” week”

Computer hacker

First, the national story …

(more…)

Cellphones: “Biggest threat to your cybersecurity”

June 27, 2013

We’re not talking NSA tracking, we’re talking ordinary old cyber-criminals intercepting messages, seizing account numbers and passwords, and taking remote control of cell phones.

image

According to Knowledge @ Wharton

By 2015, more Americans are expected to access the Internet through a mobile device than a PC.

And,  45% of surveyed users do not see cybersecurity on their mobile devices as a threat in the same way as they see it on their computers.

The 55% couldn’t be more wrong.

Here’s why …

(more…)