Outsmarting hackers isn’t easy. Many of them are masters in their field of expertise. They can either be your own, once-trusted team members or they unknown, malicious strangers. In the computing sector of this modern age, when a person hears the word ‘hacker’, it means trouble. It has become a negative word denoting someone who […]
Better Stacked Than Hacked!
Are you like most business owners? Most business owners say that they would rather have stacks of cash than to have their websites hacked. They say it, but they usually don’t do anything about it. It’s like saying you want to lose 15 pounds and then eating a box of Twinkies. It just doesn’t make […]
Hackers Are Bullies!
There has been a ton of emphasis on bullying lately. Many good-hearted people are attempting to remove it permanently from the schools. With so much focus, it’s a wonder we haven’t discussed the role that hackers play as bullies. We often hear about the abuses they’ve performed on big, strong companies like Yahoo, Google, Best […]
New Book Says “The Hackers are Coming!”
Learn how to improve your online security skills by reading Ronald Nutter’s new book “The Hackers Are Coming.” This online security expert will help you choose the best password management and two-factor authentication tools. These tools won’t keep breaches like the one at Yahoo from happening, you’ll need daily vulnerability scanning to even have a […]
Is Your Mobile App Hack Proof – Part Two
In Part One of this article we discussed the first category of potential binary risks associated with hack proof mobile apps. A hack exposes a company to significant economic, legal and reputational risks. The impact of not having a hack proof app can be devastating and all-encompassing. I know it’s difficult as an app developer […]
Is Your Mobile App Hack Proof? Part One
Are you afraid that after everything you’ve done to build your app that it might not be hack proof? A hack can expose a company to serious risks and the negative impact can be devastating. Imagine having your mobile health app reprogrammed to instruct you to deliver a lethal dose of medication. If it isn’t hack […]
Understanding the DoC’s NIST Cyber Security Framework
The Department of Commerce Provides Website Owners with High-Level Security Guidelines The DoC issued the NIST Cyber Security Framework in February 2014. NIST stands for National Institute of Standards and Technology. Its framework organizes security around five functions: Identify, Protect, Detect, Respond, and Recover. These represent the high-level activities that help organizations make sound decisions around risk/threat […]
China Launches Hack-Proof Satellite
As soon as you say the words “hack-proof satellite” you know that some veteran hackers are going to get together and try to prove you wrong. But, at least for a few years, the assertion from the Chinese that their communication satellite is unhackable may be right. In an effort to help develop an unhackable […]