Cybersecurity: Russian Hackers, Privacy, and You

WordCamp I was invited to give a presentation about Cybersecurity at WordCamp Orange County 2017, I chose to discuss privacy aimed at the average user. It was my first WordCamp presentation and it seemed to be well-received. WordCamp is a conference that focuses on everything WordPress. WordCamps are informal, community-organized events that are put together …

Cybersecurity: Russian Hackers, Privacy, and YouRead More »

Current Events – Top 5 Cybersecurity Developments of 2016

By Chris Williams To kick off the new year, we’ll take a look back at 5 of the most important cybersecurity events and trends from 2016, along with the circumstances that made each noteworthy. 5 – IoT-fueled DDoS attacks result in highest throughput events in Internet history The threat posed by distributed denial of service …

Current Events – Top 5 Cybersecurity Developments of 2016Read More »

Recognizing Computer Threats – Data Breach Awareness, Part II

By Chris Williams Recap from Part I Large-scale data breaches are increasing in both frequency and magnitude, leading to an unprecedented threat to consumers’ confidential personal and financial information. Laws currently on the books concerning data breach notifications are fairly weak; compromised organizations often sit on information for weeks or months (occasionally years) before notifying …

Recognizing Computer Threats – Data Breach Awareness, Part IIRead More »

Recognizing Computer Threats – Data Breach Awareness, Part I

By Chris Williams Data breach If it seems like data breaches are becoming more and more commonplace all the time, that’s because it’s true: the frequency of data breach and security incidents that result in some level of data leakage is on the rise. On top of that, the public’s perception of these incidents is …

Recognizing Computer Threats – Data Breach Awareness, Part IRead More »

Mirai, DDoS Attacks, and the State of IoT Security

By Chris Williams Mirai A malware package designed to infect network-connected devices that lacked security, gaining remote access to a large number of hosts (bots) for the purpose of conducting distributed denial of service attacks. Hackers control infected bots from a centralized platform or control server—this control server can issue arbitrary commands to the entire …

Mirai, DDoS Attacks, and the State of IoT SecurityRead More »