Chad Calease

230 Flips | 1 Magazine | 49 Likes | 34 Following | 11 Followers | @calease | Dad, ludic, people-focused technologist, grateful for many gifts. Mom said, "There's always one weirdo on the bus!" But I can never find him.

Hackers can gain access to your computer monitor — a cybersecurity expert shows us how easy it is

Featured Partners<p>CNBC<br>• Bloomberg<br>• The Wall Street Journal<br>• Fox Business<br>• CNN Money<br>• The Street<br>• Zacks<br>• Kiplinger

Apple claims it can collect your data without violating your privacy; here's how

Apple recently explained how it is able to collect user data without connecting it to any user's identity.<p>Apple has developed algorithms that allow …

Why Third-Party Security Is your Security

Managing third-party risk isn't just a good idea, in many cases, it's the law. This security framework can help you minimize the threat.<p>Depending on …

Circuit breaker thieves shine light on sheriff’s use of facial recognition

Even after seeming success story, Riverside County Sheriff's Department stays mum.<p>Who knew that there was money in stolen circuit breakers?<p>Late last …

The apps of these major banks were found to have security flaws

Your banking apps may not be as safe as you think it is.<p>Three researchers created a tool to check the security of 400 different apps that require …

Apps

This Elon Musk Email to Tesla Employees Is a Powerful Lesson in Authentic, Heartfelt Leadership

When times get tough, great leaders don't just protect -- they connect.<p>Elon Musk is one of the world's most popular entrepreneurs. As the guiding force behind Tesla, SpaceX, and OpenAI -- not to mention helping to found PayPal -- he tackles some of the biggest challenges.<p>That includes some of the …

Tesla

The Avoidable Mistakes Executives Continue to Make After a Data Breach

The past few years have taught us that companies <i>will</i> be breached and consumer data <i>will</i> be stolen. Last year was a record year for data breaches, and 2017, so far, has seen its fair share of high-profile cyberattacks. Still, top executives continue to stumble in the way they respond to an attack, …

Identity Theft

Are Zombie Accounts Putting Your Personal Data at Risk?

Consumers who leave old online accounts open are putting themselves at risk, and they likely don't even know it.<p>The reason? It's "zombie accounts." …

Google admits it tracked user location data even when the setting was turned off

It did so via cell tower data<p>Android phones gather your location data and send it to Google, even if you’ve turned off location services and don’t have a SIM card, <i>Quartz</i> reported today.<p>The term “location services” oftentimes refers to exact GPS data for app usage, such as Google Maps finding your …

The Key to Better Cybersecurity: Keep Employee Rules Simple

It’s a common adage that employees are the weak link in corporate cybersecurity. But I believe they are also the best defense, <i>if</i> they are given policies that are easy to follow and not too numerous and complex. Employee security training and best practices need to be user friendly and simple to be …

Employment

3 Pillars of Cyberthreat Intelligence

Strong enterprise cybersecurity programs must be a built on a framework that incorporates strategic, operational, and tactical leadership and …

Uber Hack Shows Vulnerability of Software Code-Sharing Services

The data breach at Uber Technologies Inc. holds a lesson for software developers who use third-party services to store and share code: be careful …

Firefox will soon flag sites that have been hacked

Firefox is having a good run right now, having just released its much speedier and better-looking Quantum browser. It's now working on a new feature that security fans are bound to like: It will warn you if you're visiting a site that has suffered a data breach. Firefox is working on the feature in …

At Berkeley, a New Generation of “Ethical Hackers” Learns to Wage Cyberwar

“Whenever I teach a security class, it happens that there is something going on in the news cycle that ties into it,” Doug Tygar, a computer-science professor at the University of California, Berkeley, told me recently. Pedagogically speaking, this has been an especially fruitful year. So far in …

U.S. Dept. of Defense

Czech high court says alleged Russian hacker can be extradited to United States

PRAGUE (Reuters) - The Prague High Court ruled on Friday that Russian citizen Yevgeniy Nikulin can be extradited to the United States where he is accused of hacking social networks including LinkedIn, a court spokeswoman said.<p>Czech police arrested Yevgeniy Nikulin in Prague in October 2016 in …

Judiciary

8 Low or No-Cost Sources of Threat Intelligence

Here's a list of sites that for little or no cost give you plenty of ideas for where to find first-rate threat intelligence.<p>9 of 9<p>Vendor blogs<p>Vendors …

And Here's Another PayPal Phishing Scam You'll Want to Avoid

The holidays are upon us, and so it is to remind ourselves once again of just how much cyber criminals enjoy playing on the very fears of consumer …

Identity Theft

MacOS Update Accidentally Undoes Apple's "Root" Bug Patch

When a company like Apple rushes out a software patch for a critical security bug, it deserves praise for protecting its customers quickly. Except, …

Security: Making yourself a hard target for hackers is easier than you think

Even following the most basic advice can provide a barrier to stop hackers and cyberattacks.<p>We seem to be in the grip of a data breach epidemic. …

How to Keep Your Kids Safe Online

Let’s face it: the internet can be a nasty place. Between predators, malware, explicit content, and other bad actors, parents can find themselves in …

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

Pretending to be someone you're not in an email has never been quite hard enough—hence phishing, that eternal scourge of internet security. But now …

Popular virtual keyboard app leaks 31 million users' personal data

Personal data belonging to over 31 million customers of a popular virtual keyboard app has leaked online, after the app's developer failed to secure …

Industrial firms fail to adopt basic security measures against hackers

New research suggests that fewer than half of industrial businesses are even monitoring for suspicious entry into their systems.<p><i>Video: What's next</i> …

More companies are detecting breaches internally

More businesses are detecting breaches internally, and they’re doing it faster than before, according to CrowdStrike’s Cyber Intrusion Services …

Stop Using Excel, Finance Chiefs Tell Staffs

Ubiquitous spreadsheet software that revolutionized accounting hasn’t kept up, CFOs say<p>By<p>Tatyana Shumsky<p>Tatyana Shumsky<p>The Wall Street Journal<p>Biography<p>@MissShumsky<p>Tatyana.Shumsky@wsj.com<p>Adobe Inc.’s finance chief Mark Garrett says his team struggles keeping track of which jobs have been filled at …

Financial Planning

Google Pushed Illegal Phone Spyware to Snoop on Your Spouse

It’s malware that stalkers love, and it poses a real threat in domestic violence. Until this week, the search giant was running thousands of ads for …

Intel ME bug storm: Is your machine among 100s just named by Acer, Dell, HP, Lenovo?

Hardware vendors race to identify and provide updates for dangerous Intel flaws.<p><i>Video: AMD vs Intel - Are you in the market for a new desktop</i> …

California Internet privacy bill could have nationwide sway — if it passes

California's Legislature is poised to vote Friday on a landmark Internet privacy bill, one that could quickly become a bellwether for the rest of the country.<p>But the measure is opposed by large Internet providers and tech companies, in an unusual alliance that could doom efforts by privacy groups …

Apple's Face ID isn't flawless — technology can and will be hacked, cybersecurity expert says

Facial recognition technology, such as in Apple's new high-end iPhone X, is more secure than other authentication systems but it isn't perfect, a …

Face ID

Infographic: Who hackers target during a cyberattack

A recently-published infographic from CBTS breaks down the different types of cyberattacks and how your company can stay protect itself.<p>Passwords …

hackerstarget