The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation

Data security is such a threat to businesses that it must be a key tenet of leadership for the C-Suite and the Boardroom. Over the last several years I have written and spoken extensively about the risks that businesses face from the threat of data breaches. (posts) One of the points I try to make is that …

Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu

Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members’ faces when I first mention the issue. The story …

A Hacker Can Takeover A Car Through Its Computer System — What About An Airplane?

Hackers can take over cars by hacking into their on board computer systems. Does it not stand to reason that they could do the same thing to an airplane? Maybe, maybe not, but a recent ruling by the FAA shows this was a concern for Boeing Model 777-200. May 18, 2015 Update: This post was …

Video: How Does Calling Yourself a “Hacker” Impact Your Rights In Court?

This past week the blogosphere brought a great deal of attention to the case Battelle Energy Alliance, LLC v. Southfork Security, Inc., 2013 WL 5637747 (D. Idaho Oct. 15, 2013), by claiming it held that if you call yourself a “hacker” you could lose your 4th Amendment rights. My friend Michael @theprez98 (a veteran, white-hat hacker, and student …

Hacker Sentenced to 5 Months Under CFAA for Hacking SodaHead.com Accounts

A Kentucky man was convicted of violating the Computer Fraud and Abuse Act for hacking into specific accounts on the website sodahead.com and replacing purported racist and homophobic content with less offensive content. Michael Pullen was able to hack into the accounts by exploiting a software vulnerability. The man was sentenced to 5 months in …

The Indispensability of Cyber Counterintelligence

You already know what a threat hacking and data breaches are to your business, right? Good. In that case, you will appreciate the following post from my friends at SpearTip about cyber counterintelligence. Here’s a little teaser: If your organization is not yet retaining a provider that specializes in this technique, referred to as “Cyber …

Yes, you can even hack a toilet! #IoT

Ahhh yes, hacking toilet now seems to be possible … and you folks thought I was crazy a few years ago for blogging about hacking a car, a home, or even hacking a human … but as you know see, you can even hack a toilet. Can you just imagine the frustration caused by a …

Car Hacking Is Very Real and Can Be Very Deadly — Watch This Video Of How To Do It

It is really quite simple: Modern cars are controlled by computers — everything, from the accelerator to the brakes to the steering to the windows to the locks — take over the computer, you take complete control over the car. The idea of hacking a car is no longer fantasy. It is real. It can …

Presentation: Helping Businesses Prepare for Computer Fraud and Data Breaches

Last night I had the wonderful opportunity to present to IMA – The Association of Accountants and Financial Professionals in Business on the topic of Helping Businesses Prepare for Computer Fraud and Data Breaches. Here are the presentation slides. I was really impressed with the quality of this event on many levels — these folks …

Computer Fraud and Abuse Act Cases Update (March 6, 2013)

Here are some recent Computer Fraud and Abuse Act (“CFAA”) cases that have been decided (or published) over the last couple of weeks: Tracfone Wireless, Inc. v. Cabrera, 883 F. Supp.2d 1220 (S.D. Fla. July 11, 2012). Defendant and former employee who engaged in selling stolen TracFone Prepaid Phones violated the unauthorized access with intent …