Articles By Howard Solomon

Phishing training needs both broad and targeted approach, says report

Employees are one of the weakest points infosec pros have to deal with in preventing cyber attacks, particularly when it...

January 23rd, 2020 Howard Solomon

Researchers find open Microsoft database with 250 million support records

Configuration mistakes by staff can be a huge embarrassment to organizations, defeating even the biggest IT security budget. Often these...

January 22nd, 2020 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today – Kids clothes site hacked, a new phony email extortion scam and be careful with Internet Explorer

Kids clothes site hacked, a new phony email extortion scam and be careful with Internet Explorer Welcome to Cyber Security...

January 22nd, 2020 Howard Solomon

New report says Windows’ EFS encryption could be leveraged by ransomware

Infosec teams are being warned about a vulnerability in Windows' file encryption capability which may mean temporarily abandoning the EFS...

January 21st, 2020 Howard Solomon

Citrix starts releasing permanent fixes for critical controller vulnerability

Citrix is urging infosec pros to quickly install fixes to versions of its Application Delivery Controller released Sunday to plug...

January 20th, 2020 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today – Income tax, data breach refund and phone scams revealed

Income tax, data breach refund and phone scams revealed. Welcome to Cyber Security Today. It's Monday January 20th. I'm Howard...

January 20th, 2020 Howard Solomon

Winnipeg-based online pharmacy warns of data breach

A Winnipeg-based online pharmacy is still offline after telling customers their information including medications and medical history may have been...

January 17th, 2020 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today – Privacy of mobile apps questioned, medical images poorly protected and more

Privacy of mobile apps questioned, models at risk on adult sites, medical images poorly protected and no hiding from this...

January 17th, 2020 Howard Solomon

How to stop ‘conversation hijacking’ from hijacking your firm

Man-in-the-middle attacks, as the name suggests, involve techniques where attackers in some way insert themselves in the middle of a...

January 16th, 2020 Howard Solomon

Do security diligence but prepare for the worst, new report advises

With cybercriminals increasingly forming alliances, infosec leaders have to toughen their security strategies, but be ready for a worst-case scenario,...

January 15th, 2020 Howard Solomon