Past GDPR Predictions: Have They Come To Fruition?
In July 2017, I wrote about GDPR and HITEC and asked if the past could predict the future. At the time, GDPR had not yet gone into effect. Now that it has been active for over a year, let’s take stock at what’s occurred. First, a quick refresher: GDPR implements ... Read More
How Hard Is It to Build a Botnet?
While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet. Would I have to dive into the Darknet and find criminal hackers and marketplaces to obtain the tools to make one? How much effort would it take to build a ... Read More
Will We Ever See the End of Account Theft?
There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know that many users of websites are using the same passwords all over the internet; even after all the years of data breaches and account takeovers and ... Read More
Cybersecurity for the Business Traveler: A Tale of Two Internets
Many of us travel for work, and there are several factors we take into consideration when we do. Finding the best flights, hotels and transportation to fit in the guidelines of compliance is the first set of hurdles, but the second can be a bit trickier: Trusting your selected location ... Read More
The End of the Telephone
Telephones have come a long way in their short lives, evolving from a simple transmitter and receiver to today’s ubiquitous smartphones. But as technologies continue to consolidate and automation takes over, what are we going to do at the end of the telephone? And what are the security implications of ... Read More
Consolidation in Consumer Products: Could it Solve the IoT Security Issues?
In 2003, I went to Zermatt, Switzerland to go snowboarding under the Matterhorn. We had an eclectic group of people from all over the world. Some of us were enthusiasts, some ski patrol or medics, and a few were backcountry avalanche trained. Because of this, we had a lot of ... Read More
Cities Paying Ransom: What Does It Mean for Taxpayers?
On September 1, Ontario’s Municipal Offices experienced a cyberattack that left their computers inoperable when Malware entered its systems and rendered its servers useless. The municipality was faced with paying a ransom to the attackers or face the consequences of being locked out of its systems. Per the advice of ... Read More
The Legitimacy of Cryptocurrency Has Made It Harder for Hackers
Last year a few noteworthy things happened in terms of cryptocurrencies. The IRS won their case against Coinbase and over 14,000 people who traded over $20,000 USD in 2015 now have to face the IRS. Exchanges in Asia started forcing KYC (Know Your Customer) requirements on customers as did most ... Read More