This morning I am doing radio interviews as a Fox News Radio contributor. My topic? The DEFCON Voting Village demonstration of hacking voting machines that have been, or may currently be, used in US elections. Here are a couple of the news stories if you are unfamiliar: Hacking a US electronic voting booth takes less than … Continue reading FUD and Voting Machine Hacking: An Important Point and Important Lesson
I thought you may like an invitation to attend two complimentary webinars that I will be doing this coming week: YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) Monday, August 7, 2017 @ 12:00 CDT LINK for more information FULL VIDEO (see below) Securing IoT Data: Compliance, … Continue reading Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data
See also: WIKILEAKS’ VAULT7 CIA HACKING TOOLS RELEASE CONUNDRUM: THE POLITICIZATION OF INTELLIGENCE WIKILEAKS AND CIA’S RUSSIAN HACKING TOOLS & TECHNIQUES: WAS IT REALLY THE RUSSIANS? https://youtu.be/MR1G6JO0is0
In the wake of WikiLeaks' Vault7 release of documents revealing the CIA's hacking tools, I must revisit a key section of a post from September 2016. The section was about the convenience of blaming "the Russians" given the craze of attributing everything wrong in the cyber world to the seemingly omnipresent "Russians." See: “SHAME HACKING” … Continue reading WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?
WFAA TV's Jane McGarry interviewed Shawn Tuma on the Good Morning Texas show to discuss how you can protect yourself from cell phone cyber threats and identity theft (Jan. 18, 2017) (WFAA LINK). https://www.youtube.com/watch?v=SAP6QG5FPPU