Hackers have obtained David Beckham's embarrassing emails from his advisors in an extortion plot in which the advisors were told "pay up or we'll release emails," according to a recent news report. When the advisors refused to pay the £1million demand, the hackers released the emails. This is yet another example of what I call shame hacking, a topic … Continue reading David Beckham’s Exposed Emails Exemplify Shame Hacking Threat
WHAT ARE YOU DOING TO OBSERVE IT? Today is Data Privacy Day! If you have been wondering “what is Data Privacy Day?” then this is your lucky day because not only is today Data Privacy Day, but here is the answer and an explanation for why it really matters to you and your company’s future … Continue reading Happy Data Privacy Day!
There has been a lot of buzz this past week about protesters indicating they plan to protest President-Elect Trump's inauguration by launching a DDoS attack on the White House website. This plan has received some high-profile publicity by articles in magazines such as Forbes and PC World. I initially learned of this discussion when I … Continue reading Trying to DDoS the White House Website to Protest Trump’s Inauguration Violates CFAA
A warning for law firms: Preet Bharara, the U.S. Attorney for the Southern District of New York, said the case should serve as a "wake-up call for law firms around the world." "You are and will be targets of cyber hacking, because you have information valuable to would-be criminals," Bharara said in a statement. But … Continue reading Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise
While the story of Kim Kardashian being robbed at gun-point while in Paris, France has created quite a stir in pop culture, it has lessons to learn about cybersecurity as well. First and foremost, it demonstrates the integral interplay between cybersecurity and physical security and how people need to always maintain situational awareness of how their … Continue reading Kim Kardashian’s Lesson on the Relationship Between Physical and Cybersecurity