Andy (אברהם נפתלי) Blumenthal Leadership, Technology, Life, and Faith ✡
Pages
(Move to ...)
Home
Articles
Books
Facebook
LinkedIn
Links
Muck Rack
Qoshe
Slideshare
SoundCloud
Times of Israel
Twitter
YouTube
▼
Showing posts with label
Hackers
.
Show all posts
Showing posts with label
Hackers
.
Show all posts
October 23, 2017
Cybersecurity Vulnerabilities Database
›
There is a very useful article in Bloomberg about how the U.S. is taking too long to publish cybersecurity vulnerabilities. And the lo...
October 23, 2016
Your Score Is Your Life
›
Absolutely fascinating article in the Washington Post . China is working on a plan to use big data to score people on their social b...
August 24, 2015
My Ashley Madison
›
So Ashley Madison is now a well-known adulterous website, particularly after hackers stole 37 million records on the site participants, an...
February 13, 2015
tURNING yOUR dEVICE aGAINST yOU!
›
So interesting article in BBC about the Samsung's "Listening TV." This TV has voice activated controls and they don...
November 23, 2014
Data 4 Ransom
›
The future of cybercrime will soon become the almost routine taking of your personal and corporate data as hostage. On...
October 20, 2014
Shining A Light On Your Privacy
›
Check out this special report... ~Half a billion~ downloads of the top 10 Flashlights Apps--the ones we all have on our smartphones--and...
October 3, 2014
Data Like Clouds
›
So data is like clouds... Clouds want to be free roaming the wild blue skies similar to how data wants to be searchable, accessible, u...
March 21, 2014
Safely Detonate That Malware
›
I like the potential of the FireEye Malware Protection System (MPS). Unlike traditional signature-based malware protections like antivi...
March 8, 2014
Security Is A Joke!
›
Fascinating video with Dan Tentler on the Shodan Search Engine...which CNN calls the "scariest search engine on the Internet." ...
February 21, 2014
Can You Trust Social Media?
›
Interesting article in BBC about a project underway to develop a system that will rate information on the Internet as trustworthy or not....
January 25, 2014
Remodulate The Shields For Cyber Security
›
I really like the concept for Cyber Security by Shape Security . They have an appliance called a ShapeShifter that uses polymorphism to c...
March 29, 2013
Catching More Flies With Honey
›
There's an old saying that you can catch more flies with honey than with vinegar. And this is true in cyberspace as well... Like ...
January 10, 2013
One-Two-Three Punch For Cyber Security
›
Here are three crafty ideas for improving our cyber security that can be used to protect, prevent, and recover from attacks: 1) Intru...
December 3, 2012
The Information High
›
A new article by Andy Blumenthal called " The Information High " at Public CIO Magazine (29 November 2012). "In addit...
February 3, 2012
Online Presence, Your Calling Card
›
In the age when Facebook has surpassed 800 million users, I still often hear people say that they don't like to join social networks...
October 13, 2011
Increase Security On Your Google Account
›
After reading the article Hacked! in The Atlantic (November 2011), I looked into Google's new security feature called 2-Step Verificat...
January 22, 2011
When My Friend Got Hacked
›
True story. So an old friend of mine had his account hacked on Facebook. And the hacker is sending chat messages to my friend’s Fac...
April 2, 2008
Hacker Camps and Enterprise Architecture
›
One of the perspectives of the enterprise architecture is Security. It details how we secure the business and technology of the organization...
December 11, 2007
Information Security and Enterprise Architecture
›
Information security is generally considered a cross-cutting area of enterprise architecture. However, based on its importance to the over...
›
Home
View web version