cyber-security

cryptocurrency

By Richard Arneson It’s been over three (3) years since Google announced that developers could no longer publish applications on Google Play willy-nilly—that is, without their apps having first been vetted. But that vetting process is largely handled like it is on Apple’s App store—manually. Yes, people are their main

FTC's findings

By Richard Arneson By now, most of us are aware that cyber threats don’t discriminate. Any business, regardless of size, industry, location, et al., is a potential target. The media, of course, is going to focus on breaches that affect huge, public-facing, high-profile corporations whose names are recognizable (Target, Uber,

Choosing options

By Richard Arneson The midterms are over, most of the concession speeches have been grudgingly made, which thankfully means no more yard signs or unwanted texts from candidates, and no longer having to hear “This message has been approved by…” at the end of competitor-bashing ads. But now it’s time

Network security

By Richard Arneson If you’ve never seen video of it, it’s happened a few times. Two pugilists—in this case MMA fighters—knock each other out simultaneously. You can see it for yourself, it’s good for a chuckle—go 35 seconds in—https://www.youtube.com/watch?v=keZLvsXs-sQ.This is exactly what you’d like to see when two (2) botnets

Hiring a hacker

By Richard Arneson In just nine (9) short years, ridesharing company Uber has risen from a small, San Francisco-based startup to a highly disruptive, $6.5 billion juggernaut that, along with its competitor Lyft, has given over 2 million people with a car and spare time on their hands the opportunity

Phishing is up

By Richard Arneson We’re entering the holiday season, which used to mean trips to the mall, circling the parking lot for a spot within a hundred yards of the door, and trying to get the clerk to accept a coupon that expired a year ago. But that’s all changed. Now

Texas A&M cyber threats

By Richard Arneson Some things just don’t make sense, like why when a baseball hits the foul pole it’s a fair ball. Shouldn’t it be called the fair pole? Or why hot dogs come in packs of ten (10) but the buns in quantities of eight (8). Oh, and how

cryptojacking

By Richard Arneson It’s one (1) of the most common speed bumps on the Internet highway—the Adobe Flash Player update message. It’s unexpected and never welcome—a little like a tornado, but not quite that bad. It may not trump some of the other digital speed bumps, like the Windows update

SD-WAN security

By Richard Arneson You wouldn’t be doing your job if IT security wasn’t at your mind’s forefront, especially if you’re looking to move to a new technology like SD-WAN. Hopefully the It won’t happen to us mindset has given way to a It can happen to anybody—we better be fully